Sep 6 00:25:10.026701 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 00:25:10.026735 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:25:10.026748 kernel: BIOS-provided physical RAM map: Sep 6 00:25:10.026759 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 6 00:25:10.026769 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Sep 6 00:25:10.026779 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Sep 6 00:25:10.026796 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Sep 6 00:25:10.026807 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Sep 6 00:25:10.026818 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Sep 6 00:25:10.026828 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Sep 6 00:25:10.026839 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Sep 6 00:25:10.026850 kernel: printk: bootconsole [earlyser0] enabled Sep 6 00:25:10.026861 kernel: NX (Execute Disable) protection: active Sep 6 00:25:10.026872 kernel: efi: EFI v2.70 by Microsoft Sep 6 00:25:10.026889 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Sep 6 00:25:10.026901 kernel: random: crng init done Sep 6 00:25:10.026912 kernel: SMBIOS 3.1.0 present. Sep 6 00:25:10.026924 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Sep 6 00:25:10.026936 kernel: Hypervisor detected: Microsoft Hyper-V Sep 6 00:25:10.026947 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Sep 6 00:25:10.026958 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 Sep 6 00:25:10.026970 kernel: Hyper-V: Nested features: 0x1e0101 Sep 6 00:25:10.026985 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Sep 6 00:25:10.026997 kernel: Hyper-V: Using hypercall for remote TLB flush Sep 6 00:25:10.027009 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Sep 6 00:25:10.027020 kernel: tsc: Marking TSC unstable due to running on Hyper-V Sep 6 00:25:10.027033 kernel: tsc: Detected 2593.905 MHz processor Sep 6 00:25:10.027046 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 00:25:10.027058 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 00:25:10.027070 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Sep 6 00:25:10.027082 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 00:25:10.027094 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Sep 6 00:25:10.027109 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Sep 6 00:25:10.027121 kernel: Using GB pages for direct mapping Sep 6 00:25:10.027133 kernel: Secure boot disabled Sep 6 00:25:10.027145 kernel: ACPI: Early table checksum verification disabled Sep 6 00:25:10.027157 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Sep 6 00:25:10.027168 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027181 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027193 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Sep 6 00:25:10.027213 kernel: ACPI: FACS 0x000000003FFFE000 000040 Sep 6 00:25:10.027227 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027239 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027252 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027265 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027277 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027294 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027306 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:25:10.027319 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Sep 6 00:25:10.027333 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Sep 6 00:25:10.027345 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Sep 6 00:25:10.027358 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Sep 6 00:25:10.027371 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Sep 6 00:25:10.027383 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Sep 6 00:25:10.027400 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Sep 6 00:25:10.027412 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Sep 6 00:25:10.027425 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Sep 6 00:25:10.027438 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Sep 6 00:25:10.027450 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 00:25:10.027463 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 00:25:10.027475 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Sep 6 00:25:10.027501 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Sep 6 00:25:10.027514 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Sep 6 00:25:10.027530 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Sep 6 00:25:10.027542 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Sep 6 00:25:10.027554 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Sep 6 00:25:10.027565 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Sep 6 00:25:10.027577 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Sep 6 00:25:10.027589 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Sep 6 00:25:10.027601 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Sep 6 00:25:10.027613 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Sep 6 00:25:10.027626 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Sep 6 00:25:10.027641 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Sep 6 00:25:10.027653 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Sep 6 00:25:10.027666 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Sep 6 00:25:10.027678 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Sep 6 00:25:10.027691 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Sep 6 00:25:10.027703 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Sep 6 00:25:10.027716 kernel: Zone ranges: Sep 6 00:25:10.027729 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 00:25:10.027743 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 6 00:25:10.027759 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Sep 6 00:25:10.027772 kernel: Movable zone start for each node Sep 6 00:25:10.027785 kernel: Early memory node ranges Sep 6 00:25:10.027798 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 6 00:25:10.027811 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Sep 6 00:25:10.027825 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Sep 6 00:25:10.027838 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Sep 6 00:25:10.027851 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Sep 6 00:25:10.027864 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 00:25:10.027881 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 6 00:25:10.027894 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Sep 6 00:25:10.027907 kernel: ACPI: PM-Timer IO Port: 0x408 Sep 6 00:25:10.027921 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Sep 6 00:25:10.027933 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Sep 6 00:25:10.027945 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 00:25:10.027957 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 00:25:10.027969 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Sep 6 00:25:10.027982 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 6 00:25:10.027997 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Sep 6 00:25:10.028008 kernel: Booting paravirtualized kernel on Hyper-V Sep 6 00:25:10.028020 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 00:25:10.028032 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 6 00:25:10.028044 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 6 00:25:10.028055 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 6 00:25:10.028068 kernel: pcpu-alloc: [0] 0 1 Sep 6 00:25:10.028079 kernel: Hyper-V: PV spinlocks enabled Sep 6 00:25:10.028091 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 00:25:10.028106 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Sep 6 00:25:10.028118 kernel: Policy zone: Normal Sep 6 00:25:10.028131 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:25:10.028144 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 00:25:10.028155 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 6 00:25:10.028168 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 6 00:25:10.028180 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 00:25:10.028192 kernel: Memory: 8071676K/8387460K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 315524K reserved, 0K cma-reserved) Sep 6 00:25:10.028207 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 6 00:25:10.028219 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 00:25:10.028241 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 00:25:10.028256 kernel: rcu: Hierarchical RCU implementation. Sep 6 00:25:10.028270 kernel: rcu: RCU event tracing is enabled. Sep 6 00:25:10.028283 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 6 00:25:10.028295 kernel: Rude variant of Tasks RCU enabled. Sep 6 00:25:10.028308 kernel: Tracing variant of Tasks RCU enabled. Sep 6 00:25:10.028321 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 00:25:10.028334 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 6 00:25:10.028347 kernel: Using NULL legacy PIC Sep 6 00:25:10.028362 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Sep 6 00:25:10.028375 kernel: Console: colour dummy device 80x25 Sep 6 00:25:10.028387 kernel: printk: console [tty1] enabled Sep 6 00:25:10.028400 kernel: printk: console [ttyS0] enabled Sep 6 00:25:10.028413 kernel: printk: bootconsole [earlyser0] disabled Sep 6 00:25:10.028429 kernel: ACPI: Core revision 20210730 Sep 6 00:25:10.028442 kernel: Failed to register legacy timer interrupt Sep 6 00:25:10.028455 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 00:25:10.028468 kernel: Hyper-V: Using IPI hypercalls Sep 6 00:25:10.028493 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Sep 6 00:25:10.028505 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 6 00:25:10.028517 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Sep 6 00:25:10.028531 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 00:25:10.028543 kernel: Spectre V2 : Mitigation: Retpolines Sep 6 00:25:10.028556 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 6 00:25:10.028572 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 6 00:25:10.028586 kernel: RETBleed: Vulnerable Sep 6 00:25:10.028598 kernel: Speculative Store Bypass: Vulnerable Sep 6 00:25:10.028610 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Sep 6 00:25:10.028623 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 6 00:25:10.028636 kernel: active return thunk: its_return_thunk Sep 6 00:25:10.028649 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 00:25:10.028662 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 00:25:10.028675 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 00:25:10.028687 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 00:25:10.028703 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 6 00:25:10.028716 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 6 00:25:10.028729 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 6 00:25:10.028742 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 00:25:10.028756 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 6 00:25:10.028769 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 6 00:25:10.028782 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 6 00:25:10.028795 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Sep 6 00:25:10.028807 kernel: Freeing SMP alternatives memory: 32K Sep 6 00:25:10.028821 kernel: pid_max: default: 32768 minimum: 301 Sep 6 00:25:10.028833 kernel: LSM: Security Framework initializing Sep 6 00:25:10.028846 kernel: SELinux: Initializing. Sep 6 00:25:10.028862 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 00:25:10.028874 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 00:25:10.028887 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Sep 6 00:25:10.028901 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Sep 6 00:25:10.028914 kernel: signal: max sigframe size: 3632 Sep 6 00:25:10.028928 kernel: rcu: Hierarchical SRCU implementation. Sep 6 00:25:10.028941 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 00:25:10.028955 kernel: smp: Bringing up secondary CPUs ... Sep 6 00:25:10.028968 kernel: x86: Booting SMP configuration: Sep 6 00:25:10.028981 kernel: .... node #0, CPUs: #1 Sep 6 00:25:10.028997 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Sep 6 00:25:10.029012 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 6 00:25:10.029024 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 00:25:10.029037 kernel: smpboot: Max logical packages: 1 Sep 6 00:25:10.029051 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Sep 6 00:25:10.029064 kernel: devtmpfs: initialized Sep 6 00:25:10.029078 kernel: x86/mm: Memory block size: 128MB Sep 6 00:25:10.029091 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Sep 6 00:25:10.029108 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 00:25:10.029122 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 6 00:25:10.029134 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 00:25:10.029147 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 00:25:10.029161 kernel: audit: initializing netlink subsys (disabled) Sep 6 00:25:10.029174 kernel: audit: type=2000 audit(1757118308.023:1): state=initialized audit_enabled=0 res=1 Sep 6 00:25:10.029187 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 00:25:10.029199 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 00:25:10.029211 kernel: cpuidle: using governor menu Sep 6 00:25:10.029227 kernel: ACPI: bus type PCI registered Sep 6 00:25:10.029240 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 00:25:10.029253 kernel: dca service started, version 1.12.1 Sep 6 00:25:10.029267 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 00:25:10.029280 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 00:25:10.029294 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 00:25:10.029307 kernel: ACPI: Added _OSI(Module Device) Sep 6 00:25:10.029322 kernel: ACPI: Added _OSI(Processor Device) Sep 6 00:25:10.029335 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 00:25:10.029351 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 00:25:10.029364 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 00:25:10.029377 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 00:25:10.029390 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 00:25:10.029402 kernel: ACPI: Interpreter enabled Sep 6 00:25:10.029415 kernel: ACPI: PM: (supports S0 S5) Sep 6 00:25:10.029428 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 00:25:10.029441 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 00:25:10.029453 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Sep 6 00:25:10.029469 kernel: iommu: Default domain type: Translated Sep 6 00:25:10.029494 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 00:25:10.029506 kernel: vgaarb: loaded Sep 6 00:25:10.029517 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 00:25:10.029529 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 00:25:10.029542 kernel: PTP clock support registered Sep 6 00:25:10.029555 kernel: Registered efivars operations Sep 6 00:25:10.029567 kernel: PCI: Using ACPI for IRQ routing Sep 6 00:25:10.029580 kernel: PCI: System does not support PCI Sep 6 00:25:10.029595 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Sep 6 00:25:10.029608 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 00:25:10.029621 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 00:25:10.029634 kernel: pnp: PnP ACPI init Sep 6 00:25:10.029647 kernel: pnp: PnP ACPI: found 3 devices Sep 6 00:25:10.029660 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 00:25:10.029673 kernel: NET: Registered PF_INET protocol family Sep 6 00:25:10.029687 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 00:25:10.029700 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 6 00:25:10.029715 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 00:25:10.029728 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 6 00:25:10.029741 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 6 00:25:10.029755 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 6 00:25:10.029768 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 6 00:25:10.029781 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 6 00:25:10.029794 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 00:25:10.029807 kernel: NET: Registered PF_XDP protocol family Sep 6 00:25:10.029820 kernel: PCI: CLS 0 bytes, default 64 Sep 6 00:25:10.029836 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 6 00:25:10.029849 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Sep 6 00:25:10.029862 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 00:25:10.029876 kernel: Initialise system trusted keyrings Sep 6 00:25:10.029889 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 6 00:25:10.029902 kernel: Key type asymmetric registered Sep 6 00:25:10.029916 kernel: Asymmetric key parser 'x509' registered Sep 6 00:25:10.029929 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 00:25:10.029942 kernel: io scheduler mq-deadline registered Sep 6 00:25:10.029958 kernel: io scheduler kyber registered Sep 6 00:25:10.029971 kernel: io scheduler bfq registered Sep 6 00:25:10.029984 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 00:25:10.029997 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 00:25:10.030011 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 00:25:10.030025 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 6 00:25:10.030038 kernel: i8042: PNP: No PS/2 controller found. Sep 6 00:25:10.030210 kernel: rtc_cmos 00:02: registered as rtc0 Sep 6 00:25:10.030336 kernel: rtc_cmos 00:02: setting system clock to 2025-09-06T00:25:09 UTC (1757118309) Sep 6 00:25:10.030451 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Sep 6 00:25:10.030469 kernel: intel_pstate: CPU model not supported Sep 6 00:25:10.030495 kernel: efifb: probing for efifb Sep 6 00:25:10.030509 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 6 00:25:10.030522 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 6 00:25:10.030536 kernel: efifb: scrolling: redraw Sep 6 00:25:10.030550 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 6 00:25:10.030564 kernel: Console: switching to colour frame buffer device 128x48 Sep 6 00:25:10.030580 kernel: fb0: EFI VGA frame buffer device Sep 6 00:25:10.030594 kernel: pstore: Registered efi as persistent store backend Sep 6 00:25:10.030606 kernel: NET: Registered PF_INET6 protocol family Sep 6 00:25:10.030618 kernel: Segment Routing with IPv6 Sep 6 00:25:10.030630 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 00:25:10.030642 kernel: NET: Registered PF_PACKET protocol family Sep 6 00:25:10.030656 kernel: Key type dns_resolver registered Sep 6 00:25:10.030669 kernel: IPI shorthand broadcast: enabled Sep 6 00:25:10.030684 kernel: sched_clock: Marking stable (711157500, 21335800)->(902250400, -169757100) Sep 6 00:25:10.030699 kernel: registered taskstats version 1 Sep 6 00:25:10.030711 kernel: Loading compiled-in X.509 certificates Sep 6 00:25:10.030724 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 00:25:10.030737 kernel: Key type .fscrypt registered Sep 6 00:25:10.030750 kernel: Key type fscrypt-provisioning registered Sep 6 00:25:10.030764 kernel: pstore: Using crash dump compression: deflate Sep 6 00:25:10.030778 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 00:25:10.030792 kernel: ima: Allocated hash algorithm: sha1 Sep 6 00:25:10.030810 kernel: ima: No architecture policies found Sep 6 00:25:10.030823 kernel: clk: Disabling unused clocks Sep 6 00:25:10.030838 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 00:25:10.030852 kernel: Write protecting the kernel read-only data: 28672k Sep 6 00:25:10.030866 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 00:25:10.030881 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 00:25:10.030895 kernel: Run /init as init process Sep 6 00:25:10.030910 kernel: with arguments: Sep 6 00:25:10.030922 kernel: /init Sep 6 00:25:10.030933 kernel: with environment: Sep 6 00:25:10.030947 kernel: HOME=/ Sep 6 00:25:10.030959 kernel: TERM=linux Sep 6 00:25:10.030969 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 00:25:10.030983 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:25:10.030999 systemd[1]: Detected virtualization microsoft. Sep 6 00:25:10.031014 systemd[1]: Detected architecture x86-64. Sep 6 00:25:10.031027 systemd[1]: Running in initrd. Sep 6 00:25:10.031044 systemd[1]: No hostname configured, using default hostname. Sep 6 00:25:10.031057 systemd[1]: Hostname set to . Sep 6 00:25:10.031072 systemd[1]: Initializing machine ID from random generator. Sep 6 00:25:10.031086 systemd[1]: Queued start job for default target initrd.target. Sep 6 00:25:10.031101 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:25:10.031115 systemd[1]: Reached target cryptsetup.target. Sep 6 00:25:10.031129 systemd[1]: Reached target paths.target. Sep 6 00:25:10.031142 systemd[1]: Reached target slices.target. Sep 6 00:25:10.031155 systemd[1]: Reached target swap.target. Sep 6 00:25:10.031171 systemd[1]: Reached target timers.target. Sep 6 00:25:10.031186 systemd[1]: Listening on iscsid.socket. Sep 6 00:25:10.031201 systemd[1]: Listening on iscsiuio.socket. Sep 6 00:25:10.031215 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 00:25:10.031228 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 00:25:10.031240 systemd[1]: Listening on systemd-journald.socket. Sep 6 00:25:10.031251 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:25:10.031266 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:25:10.031278 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:25:10.031291 systemd[1]: Reached target sockets.target. Sep 6 00:25:10.031302 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:25:10.031311 systemd[1]: Finished network-cleanup.service. Sep 6 00:25:10.031318 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 00:25:10.031326 systemd[1]: Starting systemd-journald.service... Sep 6 00:25:10.031337 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:25:10.031347 systemd[1]: Starting systemd-resolved.service... Sep 6 00:25:10.031357 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 00:25:10.031369 systemd-journald[183]: Journal started Sep 6 00:25:10.031416 systemd-journald[183]: Runtime Journal (/run/log/journal/d7e501319fe74746b4aaaa36620e7c7b) is 8.0M, max 159.0M, 151.0M free. Sep 6 00:25:10.033391 systemd-modules-load[184]: Inserted module 'overlay' Sep 6 00:25:10.039708 systemd[1]: Started systemd-journald.service. Sep 6 00:25:10.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.054495 kernel: audit: type=1130 audit(1757118310.043:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.054763 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:25:10.061580 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 00:25:10.066266 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 00:25:10.073568 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 00:25:10.078040 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:25:10.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.101834 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:25:10.103095 kernel: audit: type=1130 audit(1757118310.058:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.106291 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 00:25:10.128917 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 00:25:10.128961 kernel: audit: type=1130 audit(1757118310.065:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.129083 systemd[1]: Starting dracut-cmdline.service... Sep 6 00:25:10.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.149655 kernel: audit: type=1130 audit(1757118310.072:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.157157 systemd-resolved[185]: Positive Trust Anchors: Sep 6 00:25:10.159668 dracut-cmdline[201]: dracut-dracut-053 Sep 6 00:25:10.161386 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:25:10.166626 kernel: Bridge firewalling registered Sep 6 00:25:10.166655 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:25:10.189947 kernel: audit: type=1130 audit(1757118310.102:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.171158 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:25:10.211877 kernel: audit: type=1130 audit(1757118310.110:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.183318 systemd-modules-load[184]: Inserted module 'br_netfilter' Sep 6 00:25:10.218933 systemd-resolved[185]: Defaulting to hostname 'linux'. Sep 6 00:25:10.222330 systemd[1]: Started systemd-resolved.service. Sep 6 00:25:10.225416 systemd[1]: Reached target nss-lookup.target. Sep 6 00:25:10.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.243661 kernel: audit: type=1130 audit(1757118310.224:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.243697 kernel: SCSI subsystem initialized Sep 6 00:25:10.270636 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 00:25:10.270674 kernel: device-mapper: uevent: version 1.0.3 Sep 6 00:25:10.275565 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 00:25:10.279513 systemd-modules-load[184]: Inserted module 'dm_multipath' Sep 6 00:25:10.282198 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:25:10.287302 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:25:10.303643 kernel: audit: type=1130 audit(1757118310.286:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.304535 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:25:10.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.321042 kernel: Loading iSCSI transport class v2.0-870. Sep 6 00:25:10.321075 kernel: audit: type=1130 audit(1757118310.309:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.339502 kernel: iscsi: registered transport (tcp) Sep 6 00:25:10.366556 kernel: iscsi: registered transport (qla4xxx) Sep 6 00:25:10.366607 kernel: QLogic iSCSI HBA Driver Sep 6 00:25:10.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.396105 systemd[1]: Finished dracut-cmdline.service. Sep 6 00:25:10.399555 systemd[1]: Starting dracut-pre-udev.service... Sep 6 00:25:10.450507 kernel: raid6: avx512x4 gen() 18231 MB/s Sep 6 00:25:10.469499 kernel: raid6: avx512x4 xor() 7699 MB/s Sep 6 00:25:10.488500 kernel: raid6: avx512x2 gen() 18423 MB/s Sep 6 00:25:10.508501 kernel: raid6: avx512x2 xor() 29607 MB/s Sep 6 00:25:10.527491 kernel: raid6: avx512x1 gen() 18200 MB/s Sep 6 00:25:10.546514 kernel: raid6: avx512x1 xor() 26847 MB/s Sep 6 00:25:10.566499 kernel: raid6: avx2x4 gen() 18222 MB/s Sep 6 00:25:10.585492 kernel: raid6: avx2x4 xor() 7733 MB/s Sep 6 00:25:10.607496 kernel: raid6: avx2x2 gen() 18238 MB/s Sep 6 00:25:10.626497 kernel: raid6: avx2x2 xor() 21723 MB/s Sep 6 00:25:10.646494 kernel: raid6: avx2x1 gen() 13883 MB/s Sep 6 00:25:10.667516 kernel: raid6: avx2x1 xor() 19372 MB/s Sep 6 00:25:10.686496 kernel: raid6: sse2x4 gen() 11241 MB/s Sep 6 00:25:10.706496 kernel: raid6: sse2x4 xor() 7226 MB/s Sep 6 00:25:10.727497 kernel: raid6: sse2x2 gen() 12706 MB/s Sep 6 00:25:10.747494 kernel: raid6: sse2x2 xor() 7218 MB/s Sep 6 00:25:10.767502 kernel: raid6: sse2x1 gen() 11485 MB/s Sep 6 00:25:10.792008 kernel: raid6: sse2x1 xor() 5898 MB/s Sep 6 00:25:10.792029 kernel: raid6: using algorithm avx512x2 gen() 18423 MB/s Sep 6 00:25:10.792042 kernel: raid6: .... xor() 29607 MB/s, rmw enabled Sep 6 00:25:10.797934 kernel: raid6: using avx512x2 recovery algorithm Sep 6 00:25:10.813508 kernel: xor: automatically using best checksumming function avx Sep 6 00:25:10.908510 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 00:25:10.917078 systemd[1]: Finished dracut-pre-udev.service. Sep 6 00:25:10.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.921000 audit: BPF prog-id=7 op=LOAD Sep 6 00:25:10.921000 audit: BPF prog-id=8 op=LOAD Sep 6 00:25:10.922301 systemd[1]: Starting systemd-udevd.service... Sep 6 00:25:10.936290 systemd-udevd[384]: Using default interface naming scheme 'v252'. Sep 6 00:25:10.941056 systemd[1]: Started systemd-udevd.service. Sep 6 00:25:10.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:10.950245 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 00:25:10.965736 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Sep 6 00:25:10.996270 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 00:25:11.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:11.001325 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:25:11.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:11.035672 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:25:11.081498 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 00:25:11.117508 kernel: AVX2 version of gcm_enc/dec engaged. Sep 6 00:25:11.117555 kernel: AES CTR mode by8 optimization enabled Sep 6 00:25:11.121498 kernel: hv_vmbus: Vmbus version:5.2 Sep 6 00:25:11.134501 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 6 00:25:11.153499 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 6 00:25:11.153550 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 00:25:11.177502 kernel: hv_vmbus: registering driver hid_hyperv Sep 6 00:25:11.184505 kernel: hv_vmbus: registering driver hv_storvsc Sep 6 00:25:11.192497 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 6 00:25:11.192528 kernel: hv_vmbus: registering driver hv_netvsc Sep 6 00:25:11.196160 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 6 00:25:11.206597 kernel: scsi host1: storvsc_host_t Sep 6 00:25:11.206879 kernel: scsi host0: storvsc_host_t Sep 6 00:25:11.207073 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 6 00:25:11.217496 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Sep 6 00:25:11.240822 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 6 00:25:11.248605 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 6 00:25:11.248640 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 6 00:25:11.264662 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 6 00:25:11.264851 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 6 00:25:11.265022 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 6 00:25:11.265195 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 6 00:25:11.265363 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 6 00:25:11.265549 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:25:11.265568 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 6 00:25:11.393925 kernel: hv_netvsc 7ced8d76-bc8c-7ced-8d76-bc8c7ced8d76 eth0: VF slot 1 added Sep 6 00:25:11.403500 kernel: hv_vmbus: registering driver hv_pci Sep 6 00:25:11.409560 kernel: hv_pci 9b19a66f-71e9-47cf-bb7d-64ffc544a137: PCI VMBus probing: Using version 0x10004 Sep 6 00:25:11.463602 kernel: hv_pci 9b19a66f-71e9-47cf-bb7d-64ffc544a137: PCI host bridge to bus 71e9:00 Sep 6 00:25:11.463718 kernel: pci_bus 71e9:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Sep 6 00:25:11.463823 kernel: pci_bus 71e9:00: No busn resource found for root bus, will use [bus 00-ff] Sep 6 00:25:11.463913 kernel: pci 71e9:00:02.0: [15b3:1016] type 00 class 0x020000 Sep 6 00:25:11.464025 kernel: pci 71e9:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 6 00:25:11.464123 kernel: pci 71e9:00:02.0: enabling Extended Tags Sep 6 00:25:11.464223 kernel: pci 71e9:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 71e9:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Sep 6 00:25:11.464319 kernel: pci_bus 71e9:00: busn_res: [bus 00-ff] end is updated to 00 Sep 6 00:25:11.464408 kernel: pci 71e9:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 6 00:25:11.557418 kernel: mlx5_core 71e9:00:02.0: enabling device (0000 -> 0002) Sep 6 00:25:11.821422 kernel: mlx5_core 71e9:00:02.0: firmware version: 14.30.5000 Sep 6 00:25:11.821623 kernel: mlx5_core 71e9:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Sep 6 00:25:11.821782 kernel: mlx5_core 71e9:00:02.0: Supported tc offload range - chains: 1, prios: 1 Sep 6 00:25:11.821919 kernel: mlx5_core 71e9:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing Sep 6 00:25:11.822019 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (447) Sep 6 00:25:11.822030 kernel: hv_netvsc 7ced8d76-bc8c-7ced-8d76-bc8c7ced8d76 eth0: VF registering: eth1 Sep 6 00:25:11.822123 kernel: mlx5_core 71e9:00:02.0 eth1: joined to eth0 Sep 6 00:25:11.823838 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:25:11.834500 kernel: mlx5_core 71e9:00:02.0 enP29161s1: renamed from eth1 Sep 6 00:25:11.844979 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 00:25:12.063318 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 00:25:12.068946 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 00:25:12.076520 systemd[1]: Starting disk-uuid.service... Sep 6 00:25:12.085037 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 00:25:12.094498 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:25:12.103514 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:25:13.115507 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:25:13.116629 disk-uuid[564]: The operation has completed successfully. Sep 6 00:25:13.184954 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 00:25:13.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.185056 systemd[1]: Finished disk-uuid.service. Sep 6 00:25:13.200852 systemd[1]: Starting verity-setup.service... Sep 6 00:25:13.235506 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 6 00:25:13.443888 systemd[1]: Found device dev-mapper-usr.device. Sep 6 00:25:13.448089 systemd[1]: Mounting sysusr-usr.mount... Sep 6 00:25:13.453684 systemd[1]: Finished verity-setup.service. Sep 6 00:25:13.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.525272 systemd[1]: Mounted sysusr-usr.mount. Sep 6 00:25:13.528846 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 00:25:13.528940 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 00:25:13.532826 systemd[1]: Starting ignition-setup.service... Sep 6 00:25:13.538068 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 00:25:13.555756 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:25:13.555794 kernel: BTRFS info (device sda6): using free space tree Sep 6 00:25:13.555806 kernel: BTRFS info (device sda6): has skinny extents Sep 6 00:25:13.611199 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 00:25:13.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.614000 audit: BPF prog-id=9 op=LOAD Sep 6 00:25:13.616091 systemd[1]: Starting systemd-networkd.service... Sep 6 00:25:13.642668 systemd-networkd[802]: lo: Link UP Sep 6 00:25:13.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.642678 systemd-networkd[802]: lo: Gained carrier Sep 6 00:25:13.643217 systemd-networkd[802]: Enumeration completed Sep 6 00:25:13.643291 systemd[1]: Started systemd-networkd.service. Sep 6 00:25:13.647168 systemd[1]: Reached target network.target. Sep 6 00:25:13.648592 systemd-networkd[802]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:25:13.653282 systemd[1]: Starting iscsiuio.service... Sep 6 00:25:13.665597 systemd[1]: Started iscsiuio.service. Sep 6 00:25:13.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.672096 systemd[1]: Starting iscsid.service... Sep 6 00:25:13.675751 iscsid[810]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:25:13.675751 iscsid[810]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 6 00:25:13.675751 iscsid[810]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 00:25:13.675751 iscsid[810]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 00:25:13.675751 iscsid[810]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 00:25:13.675751 iscsid[810]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:25:13.675751 iscsid[810]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 00:25:13.712913 kernel: mlx5_core 71e9:00:02.0 enP29161s1: Link up Sep 6 00:25:13.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.677556 systemd[1]: Started iscsid.service. Sep 6 00:25:13.681968 systemd[1]: Starting dracut-initqueue.service... Sep 6 00:25:13.692866 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 00:25:13.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.717711 systemd[1]: Finished dracut-initqueue.service. Sep 6 00:25:13.721694 systemd[1]: Reached target remote-fs-pre.target. Sep 6 00:25:13.727981 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:25:13.734173 systemd[1]: Reached target remote-fs.target. Sep 6 00:25:13.747201 kernel: hv_netvsc 7ced8d76-bc8c-7ced-8d76-bc8c7ced8d76 eth0: Data path switched to VF: enP29161s1 Sep 6 00:25:13.744704 systemd[1]: Starting dracut-pre-mount.service... Sep 6 00:25:13.755730 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:25:13.754539 systemd-networkd[802]: enP29161s1: Link UP Sep 6 00:25:13.754868 systemd-networkd[802]: eth0: Link UP Sep 6 00:25:13.755579 systemd-networkd[802]: eth0: Gained carrier Sep 6 00:25:13.759977 systemd-networkd[802]: enP29161s1: Gained carrier Sep 6 00:25:13.764086 systemd[1]: Finished dracut-pre-mount.service. Sep 6 00:25:13.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.786564 systemd-networkd[802]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16 Sep 6 00:25:13.886287 systemd[1]: Finished ignition-setup.service. Sep 6 00:25:13.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:13.891429 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 00:25:15.255776 systemd-networkd[802]: eth0: Gained IPv6LL Sep 6 00:25:17.200559 ignition[829]: Ignition 2.14.0 Sep 6 00:25:17.200577 ignition[829]: Stage: fetch-offline Sep 6 00:25:17.200682 ignition[829]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:25:17.200736 ignition[829]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:25:17.304541 ignition[829]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:25:17.304737 ignition[829]: parsed url from cmdline: "" Sep 6 00:25:17.304742 ignition[829]: no config URL provided Sep 6 00:25:17.307600 ignition[829]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:25:17.307618 ignition[829]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:25:17.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.310753 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 00:25:17.336525 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 6 00:25:17.336555 kernel: audit: type=1130 audit(1757118317.314:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.307626 ignition[829]: failed to fetch config: resource requires networking Sep 6 00:25:17.315443 systemd[1]: Starting ignition-fetch.service... Sep 6 00:25:17.308623 ignition[829]: Ignition finished successfully Sep 6 00:25:17.344244 ignition[835]: Ignition 2.14.0 Sep 6 00:25:17.344253 ignition[835]: Stage: fetch Sep 6 00:25:17.344389 ignition[835]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:25:17.344422 ignition[835]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:25:17.354240 ignition[835]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:25:17.354388 ignition[835]: parsed url from cmdline: "" Sep 6 00:25:17.354392 ignition[835]: no config URL provided Sep 6 00:25:17.354397 ignition[835]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:25:17.354405 ignition[835]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:25:17.354434 ignition[835]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 6 00:25:17.455608 ignition[835]: GET result: OK Sep 6 00:25:17.455689 ignition[835]: config has been read from IMDS userdata Sep 6 00:25:17.455712 ignition[835]: parsing config with SHA512: 1fded5cfe1b480106387b1460b7fd1a653bc3c380bbf4cb707e4fb8277ce5379e27bf5617bcc155d7afd96a4d7bdeb835615479ab890314318152d5c8b5fddf8 Sep 6 00:25:17.458383 unknown[835]: fetched base config from "system" Sep 6 00:25:17.458896 ignition[835]: fetch: fetch complete Sep 6 00:25:17.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.458393 unknown[835]: fetched base config from "system" Sep 6 00:25:17.480654 kernel: audit: type=1130 audit(1757118317.463:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.458903 ignition[835]: fetch: fetch passed Sep 6 00:25:17.458400 unknown[835]: fetched user config from "azure" Sep 6 00:25:17.458948 ignition[835]: Ignition finished successfully Sep 6 00:25:17.460851 systemd[1]: Finished ignition-fetch.service. Sep 6 00:25:17.465445 systemd[1]: Starting ignition-kargs.service... Sep 6 00:25:17.489807 ignition[841]: Ignition 2.14.0 Sep 6 00:25:17.489813 ignition[841]: Stage: kargs Sep 6 00:25:17.489921 ignition[841]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:25:17.489950 ignition[841]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:25:17.497357 ignition[841]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:25:17.498458 ignition[841]: kargs: kargs passed Sep 6 00:25:17.498509 ignition[841]: Ignition finished successfully Sep 6 00:25:17.501850 systemd[1]: Finished ignition-kargs.service. Sep 6 00:25:17.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.521648 systemd[1]: Starting ignition-disks.service... Sep 6 00:25:17.525540 kernel: audit: type=1130 audit(1757118317.509:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.532838 ignition[847]: Ignition 2.14.0 Sep 6 00:25:17.532848 ignition[847]: Stage: disks Sep 6 00:25:17.532992 ignition[847]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:25:17.533024 ignition[847]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:25:17.543296 ignition[847]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:25:17.546648 ignition[847]: disks: disks passed Sep 6 00:25:17.546705 ignition[847]: Ignition finished successfully Sep 6 00:25:17.550548 systemd[1]: Finished ignition-disks.service. Sep 6 00:25:17.572410 kernel: audit: type=1130 audit(1757118317.550:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.550780 systemd[1]: Reached target initrd-root-device.target. Sep 6 00:25:17.551132 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:25:17.551530 systemd[1]: Reached target local-fs.target. Sep 6 00:25:17.551953 systemd[1]: Reached target sysinit.target. Sep 6 00:25:17.552327 systemd[1]: Reached target basic.target. Sep 6 00:25:17.553639 systemd[1]: Starting systemd-fsck-root.service... Sep 6 00:25:17.631721 systemd-fsck[855]: ROOT: clean, 629/7326000 files, 481084/7359488 blocks Sep 6 00:25:17.644092 systemd[1]: Finished systemd-fsck-root.service. Sep 6 00:25:17.661610 kernel: audit: type=1130 audit(1757118317.647:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:17.649133 systemd[1]: Mounting sysroot.mount... Sep 6 00:25:17.672520 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 00:25:17.672915 systemd[1]: Mounted sysroot.mount. Sep 6 00:25:17.676766 systemd[1]: Reached target initrd-root-fs.target. Sep 6 00:25:17.749983 systemd[1]: Mounting sysroot-usr.mount... Sep 6 00:25:17.753961 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 6 00:25:17.756088 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 00:25:17.756124 systemd[1]: Reached target ignition-diskful.target. Sep 6 00:25:17.761294 systemd[1]: Mounted sysroot-usr.mount. Sep 6 00:25:17.814020 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:25:17.820288 systemd[1]: Starting initrd-setup-root.service... Sep 6 00:25:17.836508 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (866) Sep 6 00:25:17.841704 initrd-setup-root[871]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 00:25:17.851402 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:25:17.851425 kernel: BTRFS info (device sda6): using free space tree Sep 6 00:25:17.851435 kernel: BTRFS info (device sda6): has skinny extents Sep 6 00:25:17.853088 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:25:17.861478 initrd-setup-root[897]: cut: /sysroot/etc/group: No such file or directory Sep 6 00:25:17.881072 initrd-setup-root[905]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 00:25:17.887100 initrd-setup-root[913]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 00:25:18.375532 systemd[1]: Finished initrd-setup-root.service. Sep 6 00:25:18.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:18.389879 systemd[1]: Starting ignition-mount.service... Sep 6 00:25:18.398205 kernel: audit: type=1130 audit(1757118318.377:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:18.392765 systemd[1]: Starting sysroot-boot.service... Sep 6 00:25:18.401709 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 6 00:25:18.401832 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 6 00:25:18.423081 ignition[932]: INFO : Ignition 2.14.0 Sep 6 00:25:18.423081 ignition[932]: INFO : Stage: mount Sep 6 00:25:18.429139 ignition[932]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:25:18.429139 ignition[932]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:25:18.445710 kernel: audit: type=1130 audit(1757118318.428:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:18.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:18.426632 systemd[1]: Finished sysroot-boot.service. Sep 6 00:25:18.449331 ignition[932]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:25:18.449331 ignition[932]: INFO : mount: mount passed Sep 6 00:25:18.449331 ignition[932]: INFO : Ignition finished successfully Sep 6 00:25:18.465449 kernel: audit: type=1130 audit(1757118318.448:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:18.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:18.446234 systemd[1]: Finished ignition-mount.service. Sep 6 00:25:19.313833 coreos-metadata[865]: Sep 06 00:25:19.313 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 6 00:25:19.345657 coreos-metadata[865]: Sep 06 00:25:19.345 INFO Fetch successful Sep 6 00:25:19.380130 coreos-metadata[865]: Sep 06 00:25:19.380 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 6 00:25:19.393984 coreos-metadata[865]: Sep 06 00:25:19.393 INFO Fetch successful Sep 6 00:25:19.408879 coreos-metadata[865]: Sep 06 00:25:19.408 INFO wrote hostname ci-3510.3.8-n-4e3667f87b to /sysroot/etc/hostname Sep 6 00:25:19.412874 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 6 00:25:19.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:19.415854 systemd[1]: Starting ignition-files.service... Sep 6 00:25:19.433299 kernel: audit: type=1130 audit(1757118319.414:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:19.438706 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:25:19.448500 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (945) Sep 6 00:25:19.456587 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:25:19.456623 kernel: BTRFS info (device sda6): using free space tree Sep 6 00:25:19.456637 kernel: BTRFS info (device sda6): has skinny extents Sep 6 00:25:19.464466 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:25:19.477796 ignition[964]: INFO : Ignition 2.14.0 Sep 6 00:25:19.477796 ignition[964]: INFO : Stage: files Sep 6 00:25:19.481505 ignition[964]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:25:19.481505 ignition[964]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:25:19.489708 ignition[964]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:25:19.509296 ignition[964]: DEBUG : files: compiled without relabeling support, skipping Sep 6 00:25:19.512079 ignition[964]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 00:25:19.512079 ignition[964]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 00:25:19.588216 ignition[964]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 00:25:19.592462 ignition[964]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 00:25:19.595684 unknown[964]: wrote ssh authorized keys file for user: core Sep 6 00:25:19.598393 ignition[964]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 6 00:25:19.598393 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem190858473" Sep 6 00:25:19.638686 ignition[964]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem190858473": device or resource busy Sep 6 00:25:19.638686 ignition[964]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem190858473", trying btrfs: device or resource busy Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem190858473" Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem190858473" Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem190858473" Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem190858473" Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190854806" Sep 6 00:25:19.638686 ignition[964]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190854806": device or resource busy Sep 6 00:25:19.638686 ignition[964]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2190854806", trying btrfs: device or resource busy Sep 6 00:25:19.638686 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190854806" Sep 6 00:25:19.611186 systemd[1]: mnt-oem190858473.mount: Deactivated successfully. Sep 6 00:25:19.705770 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190854806" Sep 6 00:25:19.705770 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2190854806" Sep 6 00:25:19.705770 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2190854806" Sep 6 00:25:19.705770 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:25:19.705770 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:25:19.705770 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Sep 6 00:25:19.630422 systemd[1]: mnt-oem2190854806.mount: Deactivated successfully. Sep 6 00:25:20.171373 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 6 00:25:20.592721 ignition[964]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 00:25:20.592721 ignition[964]: INFO : files: op(f): [started] processing unit "waagent.service" Sep 6 00:25:20.592721 ignition[964]: INFO : files: op(f): [finished] processing unit "waagent.service" Sep 6 00:25:20.592721 ignition[964]: INFO : files: op(10): [started] processing unit "nvidia.service" Sep 6 00:25:20.592721 ignition[964]: INFO : files: op(10): [finished] processing unit "nvidia.service" Sep 6 00:25:20.592721 ignition[964]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Sep 6 00:25:20.612194 ignition[964]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Sep 6 00:25:20.612194 ignition[964]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Sep 6 00:25:20.612194 ignition[964]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Sep 6 00:25:20.612194 ignition[964]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:25:20.612194 ignition[964]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:25:20.612194 ignition[964]: INFO : files: files passed Sep 6 00:25:20.612194 ignition[964]: INFO : Ignition finished successfully Sep 6 00:25:20.633594 systemd[1]: Finished ignition-files.service. Sep 6 00:25:20.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.639652 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 00:25:20.654535 kernel: audit: type=1130 audit(1757118320.635:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.654538 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 00:25:20.659945 systemd[1]: Starting ignition-quench.service... Sep 6 00:25:20.663901 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 00:25:20.666082 systemd[1]: Finished ignition-quench.service. Sep 6 00:25:20.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.672717 initrd-setup-root-after-ignition[990]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 00:25:20.676883 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 00:25:20.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.677422 systemd[1]: Reached target ignition-complete.target. Sep 6 00:25:20.684620 systemd[1]: Starting initrd-parse-etc.service... Sep 6 00:25:20.700498 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 00:25:20.700723 systemd[1]: Finished initrd-parse-etc.service. Sep 6 00:25:20.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.706687 systemd[1]: Reached target initrd-fs.target. Sep 6 00:25:20.710325 systemd[1]: Reached target initrd.target. Sep 6 00:25:20.713777 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 00:25:20.717373 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 00:25:20.728452 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 00:25:20.731480 systemd[1]: Starting initrd-cleanup.service... Sep 6 00:25:20.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.744547 systemd[1]: Stopped target nss-lookup.target. Sep 6 00:25:20.746714 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 00:25:20.751022 systemd[1]: Stopped target timers.target. Sep 6 00:25:20.754828 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 00:25:20.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.754975 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 00:25:20.758748 systemd[1]: Stopped target initrd.target. Sep 6 00:25:20.762614 systemd[1]: Stopped target basic.target. Sep 6 00:25:20.766476 systemd[1]: Stopped target ignition-complete.target. Sep 6 00:25:20.770008 systemd[1]: Stopped target ignition-diskful.target. Sep 6 00:25:20.773764 systemd[1]: Stopped target initrd-root-device.target. Sep 6 00:25:20.777848 systemd[1]: Stopped target remote-fs.target. Sep 6 00:25:20.781914 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 00:25:20.786088 systemd[1]: Stopped target sysinit.target. Sep 6 00:25:20.789811 systemd[1]: Stopped target local-fs.target. Sep 6 00:25:20.793677 systemd[1]: Stopped target local-fs-pre.target. Sep 6 00:25:20.797595 systemd[1]: Stopped target swap.target. Sep 6 00:25:20.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.801076 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 00:25:20.801229 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 00:25:20.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.804827 systemd[1]: Stopped target cryptsetup.target. Sep 6 00:25:20.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.808389 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 00:25:20.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.808558 systemd[1]: Stopped dracut-initqueue.service. Sep 6 00:25:20.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.812911 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 00:25:20.837857 iscsid[810]: iscsid shutting down. Sep 6 00:25:20.813040 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 00:25:20.817061 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 00:25:20.847713 ignition[1003]: INFO : Ignition 2.14.0 Sep 6 00:25:20.847713 ignition[1003]: INFO : Stage: umount Sep 6 00:25:20.847713 ignition[1003]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:25:20.847713 ignition[1003]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:25:20.817191 systemd[1]: Stopped ignition-files.service. Sep 6 00:25:20.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.865271 ignition[1003]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:25:20.865271 ignition[1003]: INFO : umount: umount passed Sep 6 00:25:20.865271 ignition[1003]: INFO : Ignition finished successfully Sep 6 00:25:20.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.820901 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 6 00:25:20.821036 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 6 00:25:20.826199 systemd[1]: Stopping ignition-mount.service... Sep 6 00:25:20.838245 systemd[1]: Stopping iscsid.service... Sep 6 00:25:20.844299 systemd[1]: Stopping sysroot-boot.service... Sep 6 00:25:20.851589 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 00:25:20.851852 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 00:25:20.863735 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 00:25:20.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.863880 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 00:25:20.872307 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 00:25:20.872801 systemd[1]: Stopped iscsid.service. Sep 6 00:25:20.890319 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 00:25:20.890660 systemd[1]: Stopped ignition-mount.service. Sep 6 00:25:20.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.904874 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 00:25:20.904999 systemd[1]: Finished initrd-cleanup.service. Sep 6 00:25:20.912330 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 00:25:20.912398 systemd[1]: Stopped ignition-disks.service. Sep 6 00:25:20.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.918108 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 00:25:20.918163 systemd[1]: Stopped ignition-kargs.service. Sep 6 00:25:20.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.924077 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 00:25:20.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.924131 systemd[1]: Stopped ignition-fetch.service. Sep 6 00:25:20.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.928541 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 00:25:20.928597 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 00:25:20.932390 systemd[1]: Stopped target paths.target. Sep 6 00:25:20.936593 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 00:25:20.940988 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 00:25:20.943545 systemd[1]: Stopped target slices.target. Sep 6 00:25:20.950615 systemd[1]: Stopped target sockets.target. Sep 6 00:25:20.954153 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 00:25:20.954207 systemd[1]: Closed iscsid.socket. Sep 6 00:25:20.960138 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 00:25:20.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.960202 systemd[1]: Stopped ignition-setup.service. Sep 6 00:25:20.965132 systemd[1]: Stopping iscsiuio.service... Sep 6 00:25:20.969764 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 00:25:20.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.970209 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 00:25:20.970305 systemd[1]: Stopped iscsiuio.service. Sep 6 00:25:20.972381 systemd[1]: Stopped target network.target. Sep 6 00:25:20.976311 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 00:25:20.976354 systemd[1]: Closed iscsiuio.socket. Sep 6 00:25:20.983317 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:25:21.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:20.987544 systemd[1]: Stopping systemd-resolved.service... Sep 6 00:25:20.988541 systemd-networkd[802]: eth0: DHCPv6 lease lost Sep 6 00:25:20.996711 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 00:25:20.996797 systemd[1]: Stopped systemd-resolved.service. Sep 6 00:25:21.008826 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:25:21.010942 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:25:21.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.014000 audit: BPF prog-id=6 op=UNLOAD Sep 6 00:25:21.015114 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 00:25:21.015164 systemd[1]: Closed systemd-networkd.socket. Sep 6 00:25:21.018000 audit: BPF prog-id=9 op=UNLOAD Sep 6 00:25:21.022025 systemd[1]: Stopping network-cleanup.service... Sep 6 00:25:21.025562 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 00:25:21.025626 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 00:25:21.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.031994 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 00:25:21.032050 systemd[1]: Stopped systemd-sysctl.service. Sep 6 00:25:21.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.038378 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 00:25:21.038432 systemd[1]: Stopped systemd-modules-load.service. Sep 6 00:25:21.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.044708 systemd[1]: Stopping systemd-udevd.service... Sep 6 00:25:21.048033 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 00:25:21.053364 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 00:25:21.055609 systemd[1]: Stopped systemd-udevd.service. Sep 6 00:25:21.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.059398 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 00:25:21.059446 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 00:25:21.065622 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 00:25:21.065665 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 00:25:21.071707 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 00:25:21.071761 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 00:25:21.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.077776 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 00:25:21.077827 systemd[1]: Stopped dracut-cmdline.service. Sep 6 00:25:21.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.083795 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 00:25:21.083845 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 00:25:21.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.090657 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 00:25:21.102849 kernel: hv_netvsc 7ced8d76-bc8c-7ced-8d76-bc8c7ced8d76 eth0: Data path switched from VF: enP29161s1 Sep 6 00:25:21.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.092880 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 00:25:21.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.097548 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 00:25:21.102913 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 00:25:21.102970 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 00:25:21.104850 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 00:25:21.104905 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 00:25:21.107863 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 00:25:21.108308 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 00:25:21.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.108408 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 00:25:21.126412 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 00:25:21.126527 systemd[1]: Stopped network-cleanup.service. Sep 6 00:25:21.330477 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 00:25:21.330652 systemd[1]: Stopped sysroot-boot.service. Sep 6 00:25:21.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.334975 systemd[1]: Reached target initrd-switch-root.target. Sep 6 00:25:21.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:21.338828 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 00:25:21.338896 systemd[1]: Stopped initrd-setup-root.service. Sep 6 00:25:21.343714 systemd[1]: Starting initrd-switch-root.service... Sep 6 00:25:21.358213 systemd[1]: Switching root. Sep 6 00:25:21.383192 systemd-journald[183]: Journal stopped Sep 6 00:25:36.848113 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Sep 6 00:25:36.848154 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 00:25:36.848172 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 00:25:36.848189 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 00:25:36.848205 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 00:25:36.848220 kernel: SELinux: policy capability open_perms=1 Sep 6 00:25:36.848242 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 00:25:36.848262 kernel: SELinux: policy capability always_check_network=0 Sep 6 00:25:36.848278 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 00:25:36.848293 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 00:25:36.848309 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 00:25:36.848326 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 00:25:36.848340 kernel: kauditd_printk_skb: 43 callbacks suppressed Sep 6 00:25:36.848358 kernel: audit: type=1403 audit(1757118324.117:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:25:36.848380 systemd[1]: Successfully loaded SELinux policy in 482.754ms. Sep 6 00:25:36.848399 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.713ms. Sep 6 00:25:36.848416 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:25:36.848430 systemd[1]: Detected virtualization microsoft. Sep 6 00:25:36.848567 systemd[1]: Detected architecture x86-64. Sep 6 00:25:36.848578 systemd[1]: Detected first boot. Sep 6 00:25:36.848587 systemd[1]: Hostname set to . Sep 6 00:25:36.848597 systemd[1]: Initializing machine ID from random generator. Sep 6 00:25:36.848606 kernel: audit: type=1400 audit(1757118325.088:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 00:25:36.848616 kernel: audit: type=1400 audit(1757118325.102:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:25:36.848625 kernel: audit: type=1400 audit(1757118325.102:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:25:36.848640 kernel: audit: type=1334 audit(1757118325.125:86): prog-id=10 op=LOAD Sep 6 00:25:36.848651 kernel: audit: type=1334 audit(1757118325.125:87): prog-id=10 op=UNLOAD Sep 6 00:25:36.848662 kernel: audit: type=1334 audit(1757118325.129:88): prog-id=11 op=LOAD Sep 6 00:25:36.848673 kernel: audit: type=1334 audit(1757118325.129:89): prog-id=11 op=UNLOAD Sep 6 00:25:36.848683 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 00:25:36.848696 kernel: audit: type=1400 audit(1757118326.492:90): avc: denied { associate } for pid=1036 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:25:36.848708 kernel: audit: type=1300 audit(1757118326.492:90): arch=c000003e syscall=188 success=yes exit=0 a0=c00018a7cc a1=c00018ea80 a2=c00019ccc0 a3=32 items=0 ppid=1019 pid=1036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:36.848723 systemd[1]: Populated /etc with preset unit settings. Sep 6 00:25:36.848735 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:25:36.848746 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:25:36.848764 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:25:36.848775 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 6 00:25:36.848783 kernel: audit: type=1334 audit(1757118336.338:92): prog-id=12 op=LOAD Sep 6 00:25:36.848792 kernel: audit: type=1334 audit(1757118336.339:93): prog-id=3 op=UNLOAD Sep 6 00:25:36.848806 kernel: audit: type=1334 audit(1757118336.343:94): prog-id=13 op=LOAD Sep 6 00:25:36.848819 kernel: audit: type=1334 audit(1757118336.347:95): prog-id=14 op=LOAD Sep 6 00:25:36.848831 kernel: audit: type=1334 audit(1757118336.347:96): prog-id=4 op=UNLOAD Sep 6 00:25:36.848840 kernel: audit: type=1334 audit(1757118336.347:97): prog-id=5 op=UNLOAD Sep 6 00:25:36.848852 kernel: audit: type=1334 audit(1757118336.352:98): prog-id=15 op=LOAD Sep 6 00:25:36.848861 kernel: audit: type=1334 audit(1757118336.352:99): prog-id=12 op=UNLOAD Sep 6 00:25:36.848873 kernel: audit: type=1334 audit(1757118336.369:100): prog-id=16 op=LOAD Sep 6 00:25:36.848882 kernel: audit: type=1334 audit(1757118336.374:101): prog-id=17 op=LOAD Sep 6 00:25:36.848894 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 00:25:36.848907 systemd[1]: Stopped initrd-switch-root.service. Sep 6 00:25:36.848919 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 00:25:36.848932 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 00:25:36.848942 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 00:25:36.848954 systemd[1]: Created slice system-getty.slice. Sep 6 00:25:36.848964 systemd[1]: Created slice system-modprobe.slice. Sep 6 00:25:36.848976 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 00:25:36.848987 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 00:25:36.849001 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 00:25:36.849015 systemd[1]: Created slice user.slice. Sep 6 00:25:36.849028 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:25:36.849039 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 00:25:36.849051 systemd[1]: Set up automount boot.automount. Sep 6 00:25:36.849063 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 00:25:36.849075 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 00:25:36.849087 systemd[1]: Stopped target initrd-fs.target. Sep 6 00:25:36.849098 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 00:25:36.849114 systemd[1]: Reached target integritysetup.target. Sep 6 00:25:36.849127 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:25:36.849137 systemd[1]: Reached target remote-fs.target. Sep 6 00:25:36.849149 systemd[1]: Reached target slices.target. Sep 6 00:25:36.849160 systemd[1]: Reached target swap.target. Sep 6 00:25:36.849171 systemd[1]: Reached target torcx.target. Sep 6 00:25:36.849183 systemd[1]: Reached target veritysetup.target. Sep 6 00:25:36.849196 systemd[1]: Listening on systemd-coredump.socket. Sep 6 00:25:36.849208 systemd[1]: Listening on systemd-initctl.socket. Sep 6 00:25:36.849218 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:25:36.849231 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:25:36.849242 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:25:36.849255 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 00:25:36.849268 systemd[1]: Mounting dev-hugepages.mount... Sep 6 00:25:36.849279 systemd[1]: Mounting dev-mqueue.mount... Sep 6 00:25:36.849291 systemd[1]: Mounting media.mount... Sep 6 00:25:36.849302 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:36.849313 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 00:25:36.849325 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 00:25:36.849336 systemd[1]: Mounting tmp.mount... Sep 6 00:25:36.849348 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 00:25:36.849361 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:25:36.849374 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:25:36.849385 systemd[1]: Starting modprobe@configfs.service... Sep 6 00:25:36.849396 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:25:36.849410 systemd[1]: Starting modprobe@drm.service... Sep 6 00:25:36.849422 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:25:36.849435 systemd[1]: Starting modprobe@fuse.service... Sep 6 00:25:36.849446 systemd[1]: Starting modprobe@loop.service... Sep 6 00:25:36.849459 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 00:25:36.849474 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 00:25:36.849497 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 00:25:36.849510 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 00:25:36.849522 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 00:25:36.849534 systemd[1]: Stopped systemd-journald.service. Sep 6 00:25:36.849546 systemd[1]: Starting systemd-journald.service... Sep 6 00:25:36.849559 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:25:36.849569 systemd[1]: Starting systemd-network-generator.service... Sep 6 00:25:36.849584 systemd[1]: Starting systemd-remount-fs.service... Sep 6 00:25:36.849597 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:25:36.849607 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 00:25:36.849620 systemd[1]: Stopped verity-setup.service. Sep 6 00:25:36.849630 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:36.849642 systemd[1]: Mounted dev-hugepages.mount. Sep 6 00:25:36.849653 systemd[1]: Mounted dev-mqueue.mount. Sep 6 00:25:36.849665 kernel: loop: module loaded Sep 6 00:25:36.849678 systemd[1]: Mounted media.mount. Sep 6 00:25:36.849691 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 00:25:36.849703 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 00:25:36.849715 systemd[1]: Mounted tmp.mount. Sep 6 00:25:36.849726 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:25:36.849738 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 00:25:36.849750 systemd[1]: Finished modprobe@configfs.service. Sep 6 00:25:36.849770 kernel: fuse: init (API version 7.34) Sep 6 00:25:36.849782 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 00:25:36.849794 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:25:36.849807 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:25:36.849823 systemd-journald[1117]: Journal started Sep 6 00:25:36.849878 systemd-journald[1117]: Runtime Journal (/run/log/journal/cb0fa07b81514c9984ce6c02b17b56e0) is 8.0M, max 159.0M, 151.0M free. Sep 6 00:25:24.117000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:25:25.088000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 00:25:25.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:25:25.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:25:25.125000 audit: BPF prog-id=10 op=LOAD Sep 6 00:25:25.125000 audit: BPF prog-id=10 op=UNLOAD Sep 6 00:25:25.129000 audit: BPF prog-id=11 op=LOAD Sep 6 00:25:25.129000 audit: BPF prog-id=11 op=UNLOAD Sep 6 00:25:26.492000 audit[1036]: AVC avc: denied { associate } for pid=1036 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:25:26.492000 audit[1036]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018a7cc a1=c00018ea80 a2=c00019ccc0 a3=32 items=0 ppid=1019 pid=1036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:26.492000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:25:26.499000 audit[1036]: AVC avc: denied { associate } for pid=1036 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 00:25:26.499000 audit[1036]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018a8a5 a2=1ed a3=0 items=2 ppid=1019 pid=1036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:26.499000 audit: CWD cwd="/" Sep 6 00:25:26.499000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:26.499000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:26.499000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:25:36.338000 audit: BPF prog-id=12 op=LOAD Sep 6 00:25:36.339000 audit: BPF prog-id=3 op=UNLOAD Sep 6 00:25:36.343000 audit: BPF prog-id=13 op=LOAD Sep 6 00:25:36.347000 audit: BPF prog-id=14 op=LOAD Sep 6 00:25:36.347000 audit: BPF prog-id=4 op=UNLOAD Sep 6 00:25:36.347000 audit: BPF prog-id=5 op=UNLOAD Sep 6 00:25:36.352000 audit: BPF prog-id=15 op=LOAD Sep 6 00:25:36.352000 audit: BPF prog-id=12 op=UNLOAD Sep 6 00:25:36.369000 audit: BPF prog-id=16 op=LOAD Sep 6 00:25:36.374000 audit: BPF prog-id=17 op=LOAD Sep 6 00:25:36.374000 audit: BPF prog-id=13 op=UNLOAD Sep 6 00:25:36.374000 audit: BPF prog-id=14 op=UNLOAD Sep 6 00:25:36.378000 audit: BPF prog-id=18 op=LOAD Sep 6 00:25:36.378000 audit: BPF prog-id=15 op=UNLOAD Sep 6 00:25:36.382000 audit: BPF prog-id=19 op=LOAD Sep 6 00:25:36.387000 audit: BPF prog-id=20 op=LOAD Sep 6 00:25:36.387000 audit: BPF prog-id=16 op=UNLOAD Sep 6 00:25:36.387000 audit: BPF prog-id=17 op=UNLOAD Sep 6 00:25:36.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.396000 audit: BPF prog-id=18 op=UNLOAD Sep 6 00:25:36.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.701000 audit: BPF prog-id=21 op=LOAD Sep 6 00:25:36.701000 audit: BPF prog-id=22 op=LOAD Sep 6 00:25:36.701000 audit: BPF prog-id=23 op=LOAD Sep 6 00:25:36.701000 audit: BPF prog-id=19 op=UNLOAD Sep 6 00:25:36.701000 audit: BPF prog-id=20 op=UNLOAD Sep 6 00:25:36.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.844000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 00:25:36.844000 audit[1117]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffeba82dd70 a2=4000 a3=7ffeba82de0c items=0 ppid=1 pid=1117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:36.844000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 00:25:36.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:26.446293 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:25:36.337080 systemd[1]: Queued start job for default target multi-user.target. Sep 6 00:25:26.461811 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:25:36.337095 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 6 00:25:26.461842 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:25:36.387980 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 00:25:26.461890 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 00:25:26.461903 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 00:25:26.461956 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 00:25:26.461971 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 00:25:26.462221 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 00:25:26.462259 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:25:26.462277 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:25:26.476976 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 00:25:26.477033 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 00:25:26.477070 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 00:25:26.477092 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 00:25:26.477112 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 00:25:26.477125 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 00:25:34.980886 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:25:34.981114 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:25:34.981238 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:25:34.981404 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:25:34.981451 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 00:25:34.981528 /usr/lib/systemd/system-generators/torcx-generator[1036]: time="2025-09-06T00:25:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 00:25:36.855549 systemd[1]: Started systemd-journald.service. Sep 6 00:25:36.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.857406 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:25:36.857589 systemd[1]: Finished modprobe@drm.service. Sep 6 00:25:36.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.859697 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:25:36.859842 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:25:36.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.862385 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 00:25:36.862540 systemd[1]: Finished modprobe@fuse.service. Sep 6 00:25:36.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.864713 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:25:36.864852 systemd[1]: Finished modprobe@loop.service. Sep 6 00:25:36.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.867084 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:25:36.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.869770 systemd[1]: Finished systemd-network-generator.service. Sep 6 00:25:36.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.872337 systemd[1]: Finished systemd-remount-fs.service. Sep 6 00:25:36.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.875236 systemd[1]: Reached target network-pre.target. Sep 6 00:25:36.879160 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 00:25:36.882878 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 00:25:36.886316 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 00:25:36.949047 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 00:25:36.952716 systemd[1]: Starting systemd-journal-flush.service... Sep 6 00:25:36.955059 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:25:36.956186 systemd[1]: Starting systemd-random-seed.service... Sep 6 00:25:36.958254 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:25:36.959358 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:25:36.962411 systemd[1]: Starting systemd-sysusers.service... Sep 6 00:25:36.967663 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:25:36.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.970348 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 00:25:36.972800 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 00:25:36.976363 systemd[1]: Starting systemd-udev-settle.service... Sep 6 00:25:36.983812 systemd[1]: Finished systemd-random-seed.service. Sep 6 00:25:36.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:36.987841 systemd[1]: Reached target first-boot-complete.target. Sep 6 00:25:36.990285 udevadm[1159]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 6 00:25:36.998761 systemd-journald[1117]: Time spent on flushing to /var/log/journal/cb0fa07b81514c9984ce6c02b17b56e0 is 23.230ms for 1155 entries. Sep 6 00:25:36.998761 systemd-journald[1117]: System Journal (/var/log/journal/cb0fa07b81514c9984ce6c02b17b56e0) is 8.0M, max 2.6G, 2.6G free. Sep 6 00:25:37.079508 systemd-journald[1117]: Received client request to flush runtime journal. Sep 6 00:25:37.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:37.023529 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:25:37.080579 systemd[1]: Finished systemd-journal-flush.service. Sep 6 00:25:37.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:37.465305 systemd[1]: Finished systemd-sysusers.service. Sep 6 00:25:37.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:37.469508 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:25:37.889275 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:25:37.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:38.107794 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 00:25:38.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:38.110000 audit: BPF prog-id=24 op=LOAD Sep 6 00:25:38.110000 audit: BPF prog-id=25 op=LOAD Sep 6 00:25:38.110000 audit: BPF prog-id=7 op=UNLOAD Sep 6 00:25:38.110000 audit: BPF prog-id=8 op=UNLOAD Sep 6 00:25:38.112260 systemd[1]: Starting systemd-udevd.service... Sep 6 00:25:38.130850 systemd-udevd[1164]: Using default interface naming scheme 'v252'. Sep 6 00:25:38.370531 systemd[1]: Started systemd-udevd.service. Sep 6 00:25:38.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:38.373000 audit: BPF prog-id=26 op=LOAD Sep 6 00:25:38.375510 systemd[1]: Starting systemd-networkd.service... Sep 6 00:25:38.410944 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 00:25:38.453000 audit: BPF prog-id=27 op=LOAD Sep 6 00:25:38.453000 audit: BPF prog-id=28 op=LOAD Sep 6 00:25:38.453000 audit: BPF prog-id=29 op=LOAD Sep 6 00:25:38.454782 systemd[1]: Starting systemd-userdbd.service... Sep 6 00:25:38.463549 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 00:25:38.484000 audit[1177]: AVC avc: denied { confidentiality } for pid=1177 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 00:25:38.492569 kernel: hv_vmbus: registering driver hv_balloon Sep 6 00:25:38.506508 kernel: hv_vmbus: registering driver hyperv_fb Sep 6 00:25:38.510575 systemd[1]: Started systemd-userdbd.service. Sep 6 00:25:38.518536 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 6 00:25:38.518584 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 6 00:25:38.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:38.530510 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 6 00:25:38.530559 kernel: hv_utils: Registering HyperV Utility Driver Sep 6 00:25:38.530579 kernel: hv_vmbus: registering driver hv_utils Sep 6 00:25:38.530597 kernel: Console: switching to colour dummy device 80x25 Sep 6 00:25:38.536504 kernel: Console: switching to colour frame buffer device 128x48 Sep 6 00:25:38.484000 audit[1177]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558b275c5a70 a1=f83c a2=7f6f93086bc5 a3=5 items=12 ppid=1164 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:38.484000 audit: CWD cwd="/" Sep 6 00:25:38.484000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=1 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=2 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=3 name=(null) inode=14894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=4 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=5 name=(null) inode=14895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=6 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=7 name=(null) inode=14896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=8 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=9 name=(null) inode=14897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=10 name=(null) inode=14893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PATH item=11 name=(null) inode=14898 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:38.484000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 00:25:38.600930 kernel: hv_utils: Heartbeat IC version 3.0 Sep 6 00:25:38.600997 kernel: hv_utils: Shutdown IC version 3.2 Sep 6 00:25:38.601040 kernel: hv_utils: TimeSync IC version 4.0 Sep 6 00:25:39.158909 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Sep 6 00:25:39.200104 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:25:39.214208 systemd[1]: Finished systemd-udev-settle.service. Sep 6 00:25:39.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:39.217858 systemd[1]: Starting lvm2-activation-early.service... Sep 6 00:25:39.221231 systemd-networkd[1170]: lo: Link UP Sep 6 00:25:39.221437 systemd-networkd[1170]: lo: Gained carrier Sep 6 00:25:39.222037 systemd-networkd[1170]: Enumeration completed Sep 6 00:25:39.222133 systemd[1]: Started systemd-networkd.service. Sep 6 00:25:39.225562 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:25:39.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:39.251677 systemd-networkd[1170]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:25:39.304852 kernel: mlx5_core 71e9:00:02.0 enP29161s1: Link up Sep 6 00:25:39.326857 kernel: hv_netvsc 7ced8d76-bc8c-7ced-8d76-bc8c7ced8d76 eth0: Data path switched to VF: enP29161s1 Sep 6 00:25:39.328065 systemd-networkd[1170]: enP29161s1: Link UP Sep 6 00:25:39.328255 systemd-networkd[1170]: eth0: Link UP Sep 6 00:25:39.328262 systemd-networkd[1170]: eth0: Gained carrier Sep 6 00:25:39.333153 systemd-networkd[1170]: enP29161s1: Gained carrier Sep 6 00:25:39.349960 systemd-networkd[1170]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16 Sep 6 00:25:39.522761 lvm[1240]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:25:39.552964 systemd[1]: Finished lvm2-activation-early.service. Sep 6 00:25:39.556237 systemd[1]: Reached target cryptsetup.target. Sep 6 00:25:39.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:39.559970 systemd[1]: Starting lvm2-activation.service... Sep 6 00:25:39.564639 lvm[1242]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:25:39.585798 systemd[1]: Finished lvm2-activation.service. Sep 6 00:25:39.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:39.588514 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:25:39.591520 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 00:25:39.591556 systemd[1]: Reached target local-fs.target. Sep 6 00:25:39.593992 systemd[1]: Reached target machines.target. Sep 6 00:25:39.597592 systemd[1]: Starting ldconfig.service... Sep 6 00:25:39.599668 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:25:39.599773 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:25:39.601012 systemd[1]: Starting systemd-boot-update.service... Sep 6 00:25:39.604191 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 00:25:39.608248 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 00:25:39.611548 systemd[1]: Starting systemd-sysext.service... Sep 6 00:25:39.766334 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1244 (bootctl) Sep 6 00:25:39.768018 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 00:25:40.251653 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 00:25:40.255289 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 00:25:40.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.284664 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 00:25:40.284892 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 00:25:40.311856 kernel: loop0: detected capacity change from 0 to 224512 Sep 6 00:25:40.352860 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 00:25:40.369881 kernel: loop1: detected capacity change from 0 to 224512 Sep 6 00:25:40.375001 (sd-sysext)[1256]: Using extensions 'kubernetes'. Sep 6 00:25:40.375477 (sd-sysext)[1256]: Merged extensions into '/usr'. Sep 6 00:25:40.396020 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.397778 systemd[1]: Mounting usr-share-oem.mount... Sep 6 00:25:40.398220 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.399933 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:25:40.403606 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:25:40.406072 systemd[1]: Starting modprobe@loop.service... Sep 6 00:25:40.406237 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.406411 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:25:40.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.406561 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.407633 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:25:40.407814 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:25:40.408732 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:25:40.411347 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:25:40.411523 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:25:40.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.419415 systemd[1]: Mounted usr-share-oem.mount. Sep 6 00:25:40.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.420497 systemd[1]: Finished systemd-sysext.service. Sep 6 00:25:40.420962 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:25:40.421078 systemd[1]: Finished modprobe@loop.service. Sep 6 00:25:40.424680 systemd[1]: Starting ensure-sysext.service... Sep 6 00:25:40.424934 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.426504 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 00:25:40.438605 systemd[1]: Reloading. Sep 6 00:25:40.449294 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 00:25:40.476573 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 00:25:40.494465 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 00:25:40.510485 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2025-09-06T00:25:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:25:40.510525 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2025-09-06T00:25:40Z" level=info msg="torcx already run" Sep 6 00:25:40.612452 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:25:40.612473 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:25:40.630153 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:25:40.696000 audit: BPF prog-id=30 op=LOAD Sep 6 00:25:40.696000 audit: BPF prog-id=31 op=LOAD Sep 6 00:25:40.696000 audit: BPF prog-id=24 op=UNLOAD Sep 6 00:25:40.696000 audit: BPF prog-id=25 op=UNLOAD Sep 6 00:25:40.696000 audit: BPF prog-id=32 op=LOAD Sep 6 00:25:40.696000 audit: BPF prog-id=26 op=UNLOAD Sep 6 00:25:40.698000 audit: BPF prog-id=33 op=LOAD Sep 6 00:25:40.698000 audit: BPF prog-id=21 op=UNLOAD Sep 6 00:25:40.698000 audit: BPF prog-id=34 op=LOAD Sep 6 00:25:40.698000 audit: BPF prog-id=35 op=LOAD Sep 6 00:25:40.698000 audit: BPF prog-id=22 op=UNLOAD Sep 6 00:25:40.698000 audit: BPF prog-id=23 op=UNLOAD Sep 6 00:25:40.699000 audit: BPF prog-id=36 op=LOAD Sep 6 00:25:40.699000 audit: BPF prog-id=27 op=UNLOAD Sep 6 00:25:40.699000 audit: BPF prog-id=37 op=LOAD Sep 6 00:25:40.699000 audit: BPF prog-id=38 op=LOAD Sep 6 00:25:40.699000 audit: BPF prog-id=28 op=UNLOAD Sep 6 00:25:40.699000 audit: BPF prog-id=29 op=UNLOAD Sep 6 00:25:40.705542 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 00:25:40.706748 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 00:25:40.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.718894 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.719166 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.720542 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:25:40.723690 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:25:40.726737 systemd[1]: Starting modprobe@loop.service... Sep 6 00:25:40.728783 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.729028 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:25:40.729225 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.730252 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:25:40.730412 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:25:40.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.732987 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:25:40.733133 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:25:40.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.735806 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:25:40.735970 systemd[1]: Finished modprobe@loop.service. Sep 6 00:25:40.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.739786 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.740115 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.741378 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:25:40.744422 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:25:40.747579 systemd[1]: Starting modprobe@loop.service... Sep 6 00:25:40.749513 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.749700 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:25:40.749862 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.750620 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:25:40.750779 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:25:40.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.753639 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:25:40.753784 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:25:40.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.756384 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:25:40.756522 systemd[1]: Finished modprobe@loop.service. Sep 6 00:25:40.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.761329 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.761662 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.762986 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:25:40.766087 systemd[1]: Starting modprobe@drm.service... Sep 6 00:25:40.769180 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:25:40.772223 systemd[1]: Starting modprobe@loop.service... Sep 6 00:25:40.774169 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.774359 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:25:40.774531 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:25:40.775538 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:25:40.775687 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:25:40.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.778527 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:25:40.778667 systemd[1]: Finished modprobe@drm.service. Sep 6 00:25:40.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.781165 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:25:40.781308 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:25:40.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.784159 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:25:40.784304 systemd[1]: Finished modprobe@loop.service. Sep 6 00:25:40.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.786871 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:25:40.786966 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:25:40.788163 systemd[1]: Finished ensure-sysext.service. Sep 6 00:25:40.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.910316 systemd-fsck[1252]: fsck.fat 4.2 (2021-01-31) Sep 6 00:25:40.910316 systemd-fsck[1252]: /dev/sda1: 790 files, 120761/258078 clusters Sep 6 00:25:40.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.912550 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 00:25:40.917400 systemd[1]: Mounting boot.mount... Sep 6 00:25:40.932077 systemd[1]: Mounted boot.mount. Sep 6 00:25:40.936929 systemd-networkd[1170]: eth0: Gained IPv6LL Sep 6 00:25:40.942709 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:25:40.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:40.949450 systemd[1]: Finished systemd-boot-update.service. Sep 6 00:25:40.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.763853 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 00:25:41.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.768499 systemd[1]: Starting audit-rules.service... Sep 6 00:25:41.770131 kernel: kauditd_printk_skb: 131 callbacks suppressed Sep 6 00:25:41.770194 kernel: audit: type=1130 audit(1757118341.766:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.784219 systemd[1]: Starting clean-ca-certificates.service... Sep 6 00:25:41.787802 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 00:25:41.790000 audit: BPF prog-id=39 op=LOAD Sep 6 00:25:41.792420 systemd[1]: Starting systemd-resolved.service... Sep 6 00:25:41.794899 kernel: audit: type=1334 audit(1757118341.790:217): prog-id=39 op=LOAD Sep 6 00:25:41.796000 audit: BPF prog-id=40 op=LOAD Sep 6 00:25:41.798510 systemd[1]: Starting systemd-timesyncd.service... Sep 6 00:25:41.801919 kernel: audit: type=1334 audit(1757118341.796:218): prog-id=40 op=LOAD Sep 6 00:25:41.804730 systemd[1]: Starting systemd-update-utmp.service... Sep 6 00:25:41.816000 audit[1371]: SYSTEM_BOOT pid=1371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.821230 systemd[1]: Finished systemd-update-utmp.service. Sep 6 00:25:41.827850 kernel: audit: type=1127 audit(1757118341.816:219): pid=1371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.841849 kernel: audit: type=1130 audit(1757118341.829:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.870743 systemd[1]: Finished clean-ca-certificates.service. Sep 6 00:25:41.873721 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:25:41.883854 kernel: audit: type=1130 audit(1757118341.872:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.919188 systemd[1]: Started systemd-timesyncd.service. Sep 6 00:25:41.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.921921 systemd[1]: Reached target time-set.target. Sep 6 00:25:41.935978 kernel: audit: type=1130 audit(1757118341.920:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.943729 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 00:25:41.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:41.958850 kernel: audit: type=1130 audit(1757118341.945:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:42.022072 systemd-resolved[1364]: Positive Trust Anchors: Sep 6 00:25:42.022089 systemd-resolved[1364]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:25:42.022140 systemd-resolved[1364]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:25:42.077010 systemd-timesyncd[1370]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Sep 6 00:25:42.077184 systemd-timesyncd[1370]: Initial clock synchronization to Sat 2025-09-06 00:25:42.076434 UTC. Sep 6 00:25:42.141758 systemd-resolved[1364]: Using system hostname 'ci-3510.3.8-n-4e3667f87b'. Sep 6 00:25:42.143617 systemd[1]: Started systemd-resolved.service. Sep 6 00:25:42.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:42.146474 systemd[1]: Reached target network.target. Sep 6 00:25:42.158898 kernel: audit: type=1130 audit(1757118342.145:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:25:42.160927 systemd[1]: Reached target network-online.target. Sep 6 00:25:42.162936 systemd[1]: Reached target nss-lookup.target. Sep 6 00:25:42.166000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 00:25:42.167854 systemd[1]: Finished audit-rules.service. Sep 6 00:25:42.172023 augenrules[1381]: No rules Sep 6 00:25:42.166000 audit[1381]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff1849d090 a2=420 a3=0 items=0 ppid=1360 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:42.174916 kernel: audit: type=1305 audit(1757118342.166:225): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 00:25:42.166000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 00:25:47.803459 ldconfig[1243]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 00:25:47.816595 systemd[1]: Finished ldconfig.service. Sep 6 00:25:47.820016 systemd[1]: Starting systemd-update-done.service... Sep 6 00:25:47.842333 systemd[1]: Finished systemd-update-done.service. Sep 6 00:25:47.845484 systemd[1]: Reached target sysinit.target. Sep 6 00:25:47.847878 systemd[1]: Started motdgen.path. Sep 6 00:25:47.849779 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 00:25:47.852546 systemd[1]: Started logrotate.timer. Sep 6 00:25:47.854395 systemd[1]: Started mdadm.timer. Sep 6 00:25:47.857935 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 00:25:47.860072 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 00:25:47.860111 systemd[1]: Reached target paths.target. Sep 6 00:25:47.861955 systemd[1]: Reached target timers.target. Sep 6 00:25:47.864099 systemd[1]: Listening on dbus.socket. Sep 6 00:25:47.867033 systemd[1]: Starting docker.socket... Sep 6 00:25:47.885328 systemd[1]: Listening on sshd.socket. Sep 6 00:25:47.887404 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:25:47.887930 systemd[1]: Listening on docker.socket. Sep 6 00:25:47.889805 systemd[1]: Reached target sockets.target. Sep 6 00:25:47.891723 systemd[1]: Reached target basic.target. Sep 6 00:25:47.893472 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:25:47.893507 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:25:47.894547 systemd[1]: Starting containerd.service... Sep 6 00:25:47.897697 systemd[1]: Starting dbus.service... Sep 6 00:25:47.900456 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 00:25:47.904097 systemd[1]: Starting extend-filesystems.service... Sep 6 00:25:47.906167 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 00:25:47.922033 systemd[1]: Starting kubelet.service... Sep 6 00:25:47.925276 systemd[1]: Starting motdgen.service... Sep 6 00:25:47.928179 systemd[1]: Started nvidia.service. Sep 6 00:25:47.931928 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 00:25:47.935562 systemd[1]: Starting sshd-keygen.service... Sep 6 00:25:47.941059 systemd[1]: Starting systemd-logind.service... Sep 6 00:25:47.944464 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:25:47.944592 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 00:25:47.945179 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 00:25:47.946083 systemd[1]: Starting update-engine.service... Sep 6 00:25:47.949285 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 00:25:47.955321 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 00:25:47.955574 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 00:25:47.985950 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 00:25:47.986206 systemd[1]: Finished motdgen.service. Sep 6 00:25:47.996682 jq[1406]: true Sep 6 00:25:47.996939 jq[1391]: false Sep 6 00:25:47.998126 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 00:25:47.998367 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 00:25:48.016906 extend-filesystems[1392]: Found loop1 Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda1 Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda2 Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda3 Sep 6 00:25:48.016906 extend-filesystems[1392]: Found usr Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda4 Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda6 Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda7 Sep 6 00:25:48.016906 extend-filesystems[1392]: Found sda9 Sep 6 00:25:48.016906 extend-filesystems[1392]: Checking size of /dev/sda9 Sep 6 00:25:48.042183 jq[1420]: true Sep 6 00:25:48.062380 env[1416]: time="2025-09-06T00:25:48.062285637Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 00:25:48.087612 env[1416]: time="2025-09-06T00:25:48.087412706Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 00:25:48.087612 env[1416]: time="2025-09-06T00:25:48.087575503Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:25:48.089454 env[1416]: time="2025-09-06T00:25:48.089236468Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:25:48.089454 env[1416]: time="2025-09-06T00:25:48.089279367Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:25:48.089600 env[1416]: time="2025-09-06T00:25:48.089535062Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:25:48.089600 env[1416]: time="2025-09-06T00:25:48.089556661Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 00:25:48.089600 env[1416]: time="2025-09-06T00:25:48.089574361Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 00:25:48.089600 env[1416]: time="2025-09-06T00:25:48.089589360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 00:25:48.089760 env[1416]: time="2025-09-06T00:25:48.089693758Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:25:48.090009 env[1416]: time="2025-09-06T00:25:48.089978152Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:25:48.090863 env[1416]: time="2025-09-06T00:25:48.090175548Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:25:48.090863 env[1416]: time="2025-09-06T00:25:48.090212947Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 00:25:48.090863 env[1416]: time="2025-09-06T00:25:48.090282846Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 00:25:48.090863 env[1416]: time="2025-09-06T00:25:48.090298745Z" level=info msg="metadata content store policy set" policy=shared Sep 6 00:25:48.103614 env[1416]: time="2025-09-06T00:25:48.103582865Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 00:25:48.104352 env[1416]: time="2025-09-06T00:25:48.104330449Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 00:25:48.104442 env[1416]: time="2025-09-06T00:25:48.104425647Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 00:25:48.104537 env[1416]: time="2025-09-06T00:25:48.104520445Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.104657 env[1416]: time="2025-09-06T00:25:48.104642443Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.104731 env[1416]: time="2025-09-06T00:25:48.104715741Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.104804 env[1416]: time="2025-09-06T00:25:48.104789840Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.104895 env[1416]: time="2025-09-06T00:25:48.104880238Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.104977 env[1416]: time="2025-09-06T00:25:48.104962836Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.105057 env[1416]: time="2025-09-06T00:25:48.105043134Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.105142 env[1416]: time="2025-09-06T00:25:48.105130832Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.105224 env[1416]: time="2025-09-06T00:25:48.105209731Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 00:25:48.105398 env[1416]: time="2025-09-06T00:25:48.105381927Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 00:25:48.105563 env[1416]: time="2025-09-06T00:25:48.105546624Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 00:25:48.106071 env[1416]: time="2025-09-06T00:25:48.106034713Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 00:25:48.106225 env[1416]: time="2025-09-06T00:25:48.106209010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.106305 env[1416]: time="2025-09-06T00:25:48.106292908Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 00:25:48.106434 env[1416]: time="2025-09-06T00:25:48.106418105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.106571 env[1416]: time="2025-09-06T00:25:48.106554702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.106646 env[1416]: time="2025-09-06T00:25:48.106632401Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.106717 env[1416]: time="2025-09-06T00:25:48.106704199Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.106790 env[1416]: time="2025-09-06T00:25:48.106776398Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.106881 env[1416]: time="2025-09-06T00:25:48.106866396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.106951 env[1416]: time="2025-09-06T00:25:48.106938394Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.107018 env[1416]: time="2025-09-06T00:25:48.107004593Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.107105 env[1416]: time="2025-09-06T00:25:48.107091391Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 00:25:48.107328 env[1416]: time="2025-09-06T00:25:48.107311586Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.107416 env[1416]: time="2025-09-06T00:25:48.107399684Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.107498 env[1416]: time="2025-09-06T00:25:48.107483583Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.107580 env[1416]: time="2025-09-06T00:25:48.107563081Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 00:25:48.107979 env[1416]: time="2025-09-06T00:25:48.107957673Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 00:25:48.108066 env[1416]: time="2025-09-06T00:25:48.108051571Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 00:25:48.108145 env[1416]: time="2025-09-06T00:25:48.108129969Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 00:25:48.108240 env[1416]: time="2025-09-06T00:25:48.108225067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 00:25:48.108638 env[1416]: time="2025-09-06T00:25:48.108545560Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.108761856Z" level=info msg="Connect containerd service" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.108807755Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.109455041Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.109558339Z" level=info msg="Start subscribing containerd event" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.109593838Z" level=info msg="Start recovering state" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.109653137Z" level=info msg="Start event monitor" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.109663337Z" level=info msg="Start snapshots syncer" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.109672936Z" level=info msg="Start cni network conf syncer for default" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.109680136Z" level=info msg="Start streaming server" Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.110521719Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.110574417Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 00:25:48.156120 env[1416]: time="2025-09-06T00:25:48.117340375Z" level=info msg="containerd successfully booted in 0.055790s" Sep 6 00:25:48.110748 systemd[1]: Started containerd.service. Sep 6 00:25:48.215332 systemd-logind[1400]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 00:25:48.221084 systemd-logind[1400]: New seat seat0. Sep 6 00:25:48.241493 extend-filesystems[1392]: Old size kept for /dev/sda9 Sep 6 00:25:48.241493 extend-filesystems[1392]: Found sr0 Sep 6 00:25:48.241849 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 00:25:48.242009 systemd[1]: Finished extend-filesystems.service. Sep 6 00:25:48.255091 bash[1440]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:25:48.255740 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 00:25:48.304444 systemd[1]: nvidia.service: Deactivated successfully. Sep 6 00:25:48.311474 dbus-daemon[1390]: [system] SELinux support is enabled Sep 6 00:25:48.311668 systemd[1]: Started dbus.service. Sep 6 00:25:48.317116 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 00:25:48.317146 systemd[1]: Reached target system-config.target. Sep 6 00:25:48.319283 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 00:25:48.319304 systemd[1]: Reached target user-config.target. Sep 6 00:25:48.321791 systemd[1]: Started systemd-logind.service. Sep 6 00:25:48.322249 dbus-daemon[1390]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 6 00:25:48.876947 update_engine[1404]: I0906 00:25:48.876538 1404 main.cc:92] Flatcar Update Engine starting Sep 6 00:25:48.924632 systemd[1]: Started update-engine.service. Sep 6 00:25:48.927209 update_engine[1404]: I0906 00:25:48.924997 1404 update_check_scheduler.cc:74] Next update check in 6m34s Sep 6 00:25:48.929589 systemd[1]: Started locksmithd.service. Sep 6 00:25:49.242951 sshd_keygen[1414]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 00:25:49.263308 systemd[1]: Finished sshd-keygen.service. Sep 6 00:25:49.267739 systemd[1]: Starting issuegen.service... Sep 6 00:25:49.271563 systemd[1]: Started waagent.service. Sep 6 00:25:49.279175 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 00:25:49.279379 systemd[1]: Finished issuegen.service. Sep 6 00:25:49.283018 systemd[1]: Starting systemd-user-sessions.service... Sep 6 00:25:49.305562 systemd[1]: Started kubelet.service. Sep 6 00:25:49.322990 systemd[1]: Finished systemd-user-sessions.service. Sep 6 00:25:49.327523 systemd[1]: Started getty@tty1.service. Sep 6 00:25:49.331682 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 00:25:49.334358 systemd[1]: Reached target getty.target. Sep 6 00:25:49.343276 systemd[1]: Reached target multi-user.target. Sep 6 00:25:49.348218 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 00:25:49.357967 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 00:25:49.358144 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 00:25:49.360716 systemd[1]: Startup finished in 977ms (firmware) + 31.373s (loader) + 883ms (kernel) + 13.672s (initrd) + 25.631s (userspace) = 1min 12.539s. Sep 6 00:25:49.835483 kubelet[1502]: E0906 00:25:49.835444 1502 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:25:49.837137 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:25:49.837250 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:25:49.837517 systemd[1]: kubelet.service: Consumed 1.066s CPU time. Sep 6 00:25:49.862610 login[1503]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 6 00:25:49.864241 login[1504]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 6 00:25:49.888028 systemd[1]: Created slice user-500.slice. Sep 6 00:25:49.889514 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 00:25:49.895332 systemd-logind[1400]: New session 2 of user core. Sep 6 00:25:49.899706 systemd-logind[1400]: New session 1 of user core. Sep 6 00:25:49.903562 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 00:25:49.905317 systemd[1]: Starting user@500.service... Sep 6 00:25:49.908951 (systemd)[1516]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:25:50.063552 systemd[1516]: Queued start job for default target default.target. Sep 6 00:25:50.064330 systemd[1516]: Reached target paths.target. Sep 6 00:25:50.064368 systemd[1516]: Reached target sockets.target. Sep 6 00:25:50.064390 systemd[1516]: Reached target timers.target. Sep 6 00:25:50.064409 systemd[1516]: Reached target basic.target. Sep 6 00:25:50.064555 systemd[1]: Started user@500.service. Sep 6 00:25:50.066129 systemd[1]: Started session-1.scope. Sep 6 00:25:50.067215 systemd[1]: Started session-2.scope. Sep 6 00:25:50.068403 systemd[1516]: Reached target default.target. Sep 6 00:25:50.068471 systemd[1516]: Startup finished in 153ms. Sep 6 00:25:50.565750 locksmithd[1486]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 00:25:55.438438 waagent[1495]: 2025-09-06T00:25:55.438332Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 6 00:25:55.452040 waagent[1495]: 2025-09-06T00:25:55.441119Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 6 00:25:55.452040 waagent[1495]: 2025-09-06T00:25:55.441997Z INFO Daemon Daemon Python: 3.9.16 Sep 6 00:25:55.452040 waagent[1495]: 2025-09-06T00:25:55.443315Z INFO Daemon Daemon Run daemon Sep 6 00:25:55.452040 waagent[1495]: 2025-09-06T00:25:55.444634Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 6 00:25:55.459634 waagent[1495]: 2025-09-06T00:25:55.459519Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 6 00:25:55.467047 waagent[1495]: 2025-09-06T00:25:55.466941Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.468265Z INFO Daemon Daemon cloud-init is enabled: False Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.468972Z INFO Daemon Daemon Using waagent for provisioning Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.470257Z INFO Daemon Daemon Activate resource disk Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.470960Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.478732Z INFO Daemon Daemon Found device: None Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.480477Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.481206Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.482883Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.483677Z INFO Daemon Daemon Running default provisioning handler Sep 6 00:25:55.493121 waagent[1495]: 2025-09-06T00:25:55.492949Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 6 00:25:55.506559 waagent[1495]: 2025-09-06T00:25:55.496253Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 6 00:25:55.506559 waagent[1495]: 2025-09-06T00:25:55.497217Z INFO Daemon Daemon cloud-init is enabled: False Sep 6 00:25:55.506559 waagent[1495]: 2025-09-06T00:25:55.498039Z INFO Daemon Daemon Copying ovf-env.xml Sep 6 00:25:55.557207 waagent[1495]: 2025-09-06T00:25:55.557036Z INFO Daemon Daemon Successfully mounted dvd Sep 6 00:25:55.613106 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 6 00:25:55.633787 waagent[1495]: 2025-09-06T00:25:55.633676Z INFO Daemon Daemon Detect protocol endpoint Sep 6 00:25:55.636434 waagent[1495]: 2025-09-06T00:25:55.636374Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 6 00:25:55.639284 waagent[1495]: 2025-09-06T00:25:55.639232Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 6 00:25:55.642427 waagent[1495]: 2025-09-06T00:25:55.642377Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 6 00:25:55.645050 waagent[1495]: 2025-09-06T00:25:55.645001Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 6 00:25:55.647501 waagent[1495]: 2025-09-06T00:25:55.647453Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 6 00:25:55.776402 waagent[1495]: 2025-09-06T00:25:55.776241Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 6 00:25:55.780108 waagent[1495]: 2025-09-06T00:25:55.780062Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 6 00:25:55.782498 waagent[1495]: 2025-09-06T00:25:55.782440Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 6 00:25:56.291637 waagent[1495]: 2025-09-06T00:25:56.291484Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 6 00:25:56.302588 waagent[1495]: 2025-09-06T00:25:56.302510Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 6 00:25:56.307582 waagent[1495]: 2025-09-06T00:25:56.303936Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 6 00:25:56.371869 waagent[1495]: 2025-09-06T00:25:56.371731Z INFO Daemon Daemon Found private key matching thumbprint 9FC07A2B9E36DD94DF7C7F0911039DF1DBCA6912 Sep 6 00:25:56.376871 waagent[1495]: 2025-09-06T00:25:56.376772Z INFO Daemon Daemon Fetch goal state completed Sep 6 00:25:56.423512 waagent[1495]: 2025-09-06T00:25:56.423431Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 578a2a67-856d-4d6e-b97e-aa41a8666c29 New eTag: 1137041374024675513] Sep 6 00:25:56.431103 waagent[1495]: 2025-09-06T00:25:56.425272Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 6 00:25:56.460723 waagent[1495]: 2025-09-06T00:25:56.460618Z INFO Daemon Daemon Starting provisioning Sep 6 00:25:56.468215 waagent[1495]: 2025-09-06T00:25:56.462346Z INFO Daemon Daemon Handle ovf-env.xml. Sep 6 00:25:56.468215 waagent[1495]: 2025-09-06T00:25:56.463354Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-4e3667f87b] Sep 6 00:25:56.482420 waagent[1495]: 2025-09-06T00:25:56.482282Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-4e3667f87b] Sep 6 00:25:56.490186 waagent[1495]: 2025-09-06T00:25:56.484149Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 6 00:25:56.490186 waagent[1495]: 2025-09-06T00:25:56.485578Z INFO Daemon Daemon Primary interface is [eth0] Sep 6 00:25:56.499555 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 6 00:25:56.499809 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 6 00:25:56.499906 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 6 00:25:56.500267 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:25:56.505880 systemd-networkd[1170]: eth0: DHCPv6 lease lost Sep 6 00:25:56.507286 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:25:56.507512 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:25:56.509934 systemd[1]: Starting systemd-networkd.service... Sep 6 00:25:56.542036 systemd-networkd[1558]: enP29161s1: Link UP Sep 6 00:25:56.542047 systemd-networkd[1558]: enP29161s1: Gained carrier Sep 6 00:25:56.543415 systemd-networkd[1558]: eth0: Link UP Sep 6 00:25:56.543424 systemd-networkd[1558]: eth0: Gained carrier Sep 6 00:25:56.543891 systemd-networkd[1558]: lo: Link UP Sep 6 00:25:56.543899 systemd-networkd[1558]: lo: Gained carrier Sep 6 00:25:56.544226 systemd-networkd[1558]: eth0: Gained IPv6LL Sep 6 00:25:56.544507 systemd-networkd[1558]: Enumeration completed Sep 6 00:25:56.544624 systemd[1]: Started systemd-networkd.service. Sep 6 00:25:56.547073 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:25:56.550872 waagent[1495]: 2025-09-06T00:25:56.550656Z INFO Daemon Daemon Create user account if not exists Sep 6 00:25:56.554587 systemd-networkd[1558]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:25:56.554758 waagent[1495]: 2025-09-06T00:25:56.554666Z INFO Daemon Daemon User core already exists, skip useradd Sep 6 00:25:56.557787 waagent[1495]: 2025-09-06T00:25:56.557709Z INFO Daemon Daemon Configure sudoer Sep 6 00:25:56.560904 waagent[1495]: 2025-09-06T00:25:56.560667Z INFO Daemon Daemon Configure sshd Sep 6 00:25:56.563432 waagent[1495]: 2025-09-06T00:25:56.563364Z INFO Daemon Daemon Deploy ssh public key. Sep 6 00:25:56.587915 systemd-networkd[1558]: eth0: DHCPv4 address 10.200.8.12/24, gateway 10.200.8.1 acquired from 168.63.129.16 Sep 6 00:25:56.590776 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:25:57.672889 waagent[1495]: 2025-09-06T00:25:57.672774Z INFO Daemon Daemon Provisioning complete Sep 6 00:25:57.686068 waagent[1495]: 2025-09-06T00:25:57.685975Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 6 00:25:57.692188 waagent[1495]: 2025-09-06T00:25:57.687341Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 6 00:25:57.692188 waagent[1495]: 2025-09-06T00:25:57.689217Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 6 00:25:57.956011 waagent[1564]: 2025-09-06T00:25:57.955822Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 6 00:25:57.956744 waagent[1564]: 2025-09-06T00:25:57.956672Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:25:57.956916 waagent[1564]: 2025-09-06T00:25:57.956855Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:25:57.968316 waagent[1564]: 2025-09-06T00:25:57.968239Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 6 00:25:57.968477 waagent[1564]: 2025-09-06T00:25:57.968423Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 6 00:25:58.021058 waagent[1564]: 2025-09-06T00:25:58.020929Z INFO ExtHandler ExtHandler Found private key matching thumbprint 9FC07A2B9E36DD94DF7C7F0911039DF1DBCA6912 Sep 6 00:25:58.021368 waagent[1564]: 2025-09-06T00:25:58.021305Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 6 00:25:58.036272 waagent[1564]: 2025-09-06T00:25:58.036205Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 5844eab6-f830-4df2-ab43-c64bceb59f04 New eTag: 1137041374024675513] Sep 6 00:25:58.036797 waagent[1564]: 2025-09-06T00:25:58.036736Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 6 00:25:58.150347 waagent[1564]: 2025-09-06T00:25:58.150173Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 6 00:25:58.159848 waagent[1564]: 2025-09-06T00:25:58.159747Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1564 Sep 6 00:25:58.163271 waagent[1564]: 2025-09-06T00:25:58.163198Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 6 00:25:58.164450 waagent[1564]: 2025-09-06T00:25:58.164388Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 6 00:25:58.237163 waagent[1564]: 2025-09-06T00:25:58.237040Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 6 00:25:58.237528 waagent[1564]: 2025-09-06T00:25:58.237464Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 6 00:25:58.245658 waagent[1564]: 2025-09-06T00:25:58.245601Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 6 00:25:58.246160 waagent[1564]: 2025-09-06T00:25:58.246095Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 6 00:25:58.247240 waagent[1564]: 2025-09-06T00:25:58.247175Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 6 00:25:58.248528 waagent[1564]: 2025-09-06T00:25:58.248468Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 6 00:25:58.248976 waagent[1564]: 2025-09-06T00:25:58.248922Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:25:58.249534 waagent[1564]: 2025-09-06T00:25:58.249478Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 6 00:25:58.249690 waagent[1564]: 2025-09-06T00:25:58.249637Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:25:58.250279 waagent[1564]: 2025-09-06T00:25:58.250225Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:25:58.250420 waagent[1564]: 2025-09-06T00:25:58.250357Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 6 00:25:58.251039 waagent[1564]: 2025-09-06T00:25:58.250979Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 6 00:25:58.251299 waagent[1564]: 2025-09-06T00:25:58.251245Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 6 00:25:58.251582 waagent[1564]: 2025-09-06T00:25:58.251527Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:25:58.252419 waagent[1564]: 2025-09-06T00:25:58.252361Z INFO EnvHandler ExtHandler Configure routes Sep 6 00:25:58.252690 waagent[1564]: 2025-09-06T00:25:58.252629Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 6 00:25:58.252690 waagent[1564]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 6 00:25:58.252690 waagent[1564]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Sep 6 00:25:58.252690 waagent[1564]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 6 00:25:58.252690 waagent[1564]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:25:58.252690 waagent[1564]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:25:58.252690 waagent[1564]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:25:58.253015 waagent[1564]: 2025-09-06T00:25:58.252961Z INFO EnvHandler ExtHandler Gateway:None Sep 6 00:25:58.253523 waagent[1564]: 2025-09-06T00:25:58.253468Z INFO EnvHandler ExtHandler Routes:None Sep 6 00:25:58.253774 waagent[1564]: 2025-09-06T00:25:58.253716Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 6 00:25:58.257873 waagent[1564]: 2025-09-06T00:25:58.257274Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 6 00:25:58.258189 waagent[1564]: 2025-09-06T00:25:58.258137Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 6 00:25:58.267982 waagent[1564]: 2025-09-06T00:25:58.267911Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 6 00:25:58.268547 waagent[1564]: 2025-09-06T00:25:58.268496Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 6 00:25:58.269373 waagent[1564]: 2025-09-06T00:25:58.269313Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 6 00:25:58.286435 waagent[1564]: 2025-09-06T00:25:58.286366Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1558' Sep 6 00:25:58.311301 waagent[1564]: 2025-09-06T00:25:58.311235Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 6 00:25:58.384482 waagent[1564]: 2025-09-06T00:25:58.384340Z INFO MonitorHandler ExtHandler Network interfaces: Sep 6 00:25:58.384482 waagent[1564]: Executing ['ip', '-a', '-o', 'link']: Sep 6 00:25:58.384482 waagent[1564]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 6 00:25:58.384482 waagent[1564]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:76:bc:8c brd ff:ff:ff:ff:ff:ff Sep 6 00:25:58.384482 waagent[1564]: 3: enP29161s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:76:bc:8c brd ff:ff:ff:ff:ff:ff\ altname enP29161p0s2 Sep 6 00:25:58.384482 waagent[1564]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 6 00:25:58.384482 waagent[1564]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 6 00:25:58.384482 waagent[1564]: 2: eth0 inet 10.200.8.12/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 6 00:25:58.384482 waagent[1564]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 6 00:25:58.384482 waagent[1564]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 6 00:25:58.384482 waagent[1564]: 2: eth0 inet6 fe80::7eed:8dff:fe76:bc8c/64 scope link \ valid_lft forever preferred_lft forever Sep 6 00:25:58.612092 waagent[1564]: 2025-09-06T00:25:58.612024Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 6 00:25:58.693048 waagent[1495]: 2025-09-06T00:25:58.692918Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 6 00:25:58.698558 waagent[1495]: 2025-09-06T00:25:58.698489Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 6 00:25:59.766745 waagent[1597]: 2025-09-06T00:25:59.766637Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 6 00:25:59.767487 waagent[1597]: 2025-09-06T00:25:59.767415Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 6 00:25:59.767654 waagent[1597]: 2025-09-06T00:25:59.767601Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 6 00:25:59.767813 waagent[1597]: 2025-09-06T00:25:59.767765Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Sep 6 00:25:59.783155 waagent[1597]: 2025-09-06T00:25:59.783053Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 6 00:25:59.783569 waagent[1597]: 2025-09-06T00:25:59.783509Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:25:59.783749 waagent[1597]: 2025-09-06T00:25:59.783699Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:25:59.784026 waagent[1597]: 2025-09-06T00:25:59.783972Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 6 00:25:59.796911 waagent[1597]: 2025-09-06T00:25:59.796825Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 6 00:25:59.805423 waagent[1597]: 2025-09-06T00:25:59.805361Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.175 Sep 6 00:25:59.806358 waagent[1597]: 2025-09-06T00:25:59.806296Z INFO ExtHandler Sep 6 00:25:59.806525 waagent[1597]: 2025-09-06T00:25:59.806474Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: fbb8d4c4-72ce-46ab-a014-467f57e97908 eTag: 1137041374024675513 source: Fabric] Sep 6 00:25:59.807272 waagent[1597]: 2025-09-06T00:25:59.807213Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 6 00:25:59.808391 waagent[1597]: 2025-09-06T00:25:59.808326Z INFO ExtHandler Sep 6 00:25:59.808547 waagent[1597]: 2025-09-06T00:25:59.808495Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 6 00:25:59.816177 waagent[1597]: 2025-09-06T00:25:59.816123Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 6 00:25:59.816649 waagent[1597]: 2025-09-06T00:25:59.816599Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 6 00:25:59.838516 waagent[1597]: 2025-09-06T00:25:59.838455Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 6 00:25:59.892576 waagent[1597]: 2025-09-06T00:25:59.892452Z INFO ExtHandler Downloaded certificate {'thumbprint': '9FC07A2B9E36DD94DF7C7F0911039DF1DBCA6912', 'hasPrivateKey': True} Sep 6 00:25:59.893811 waagent[1597]: 2025-09-06T00:25:59.893738Z INFO ExtHandler Fetch goal state from WireServer completed Sep 6 00:25:59.894668 waagent[1597]: 2025-09-06T00:25:59.894606Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 6 00:25:59.913708 waagent[1597]: 2025-09-06T00:25:59.913610Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 6 00:25:59.921471 waagent[1597]: 2025-09-06T00:25:59.921382Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 6 00:25:59.925093 waagent[1597]: 2025-09-06T00:25:59.925001Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 6 00:25:59.925314 waagent[1597]: 2025-09-06T00:25:59.925259Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 6 00:25:59.952797 waagent[1597]: 2025-09-06T00:25:59.952691Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: Sep 6 00:25:59.952797 waagent[1597]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:25:59.952797 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:25:59.952797 waagent[1597]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:25:59.952797 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:25:59.952797 waagent[1597]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:25:59.952797 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:25:59.952797 waagent[1597]: 54 7806 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 00:25:59.953899 waagent[1597]: 2025-09-06T00:25:59.953812Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 6 00:25:59.956499 waagent[1597]: 2025-09-06T00:25:59.956398Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 6 00:25:59.956760 waagent[1597]: 2025-09-06T00:25:59.956706Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 6 00:25:59.957144 waagent[1597]: 2025-09-06T00:25:59.957087Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 6 00:25:59.964282 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 00:25:59.964593 systemd[1]: Stopped kubelet.service. Sep 6 00:25:59.964651 systemd[1]: kubelet.service: Consumed 1.066s CPU time. Sep 6 00:25:59.966297 systemd[1]: Starting kubelet.service... Sep 6 00:25:59.968466 waagent[1597]: 2025-09-06T00:25:59.968408Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 6 00:25:59.969196 waagent[1597]: 2025-09-06T00:25:59.969132Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 6 00:25:59.979845 waagent[1597]: 2025-09-06T00:25:59.979761Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1597 Sep 6 00:25:59.984576 waagent[1597]: 2025-09-06T00:25:59.984501Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 6 00:25:59.985693 waagent[1597]: 2025-09-06T00:25:59.985631Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 6 00:25:59.986880 waagent[1597]: 2025-09-06T00:25:59.986804Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 6 00:25:59.990473 waagent[1597]: 2025-09-06T00:25:59.990403Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 6 00:25:59.991040 waagent[1597]: 2025-09-06T00:25:59.990968Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 6 00:25:59.992890 waagent[1597]: 2025-09-06T00:25:59.992804Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 6 00:25:59.993521 waagent[1597]: 2025-09-06T00:25:59.993456Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:25:59.993861 waagent[1597]: 2025-09-06T00:25:59.993773Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:25:59.994674 waagent[1597]: 2025-09-06T00:25:59.994608Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 6 00:25:59.995253 waagent[1597]: 2025-09-06T00:25:59.995183Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 6 00:25:59.995253 waagent[1597]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 6 00:25:59.995253 waagent[1597]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Sep 6 00:25:59.995253 waagent[1597]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 6 00:25:59.995253 waagent[1597]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:25:59.995253 waagent[1597]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:25:59.995253 waagent[1597]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:25:59.998948 waagent[1597]: 2025-09-06T00:25:59.998823Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 6 00:25:59.999910 waagent[1597]: 2025-09-06T00:25:59.999845Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:26:00.000723 waagent[1597]: 2025-09-06T00:26:00.000655Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:26:00.001414 waagent[1597]: 2025-09-06T00:26:00.001346Z INFO EnvHandler ExtHandler Configure routes Sep 6 00:26:00.001734 waagent[1597]: 2025-09-06T00:26:00.001671Z INFO EnvHandler ExtHandler Gateway:None Sep 6 00:26:00.004782 waagent[1597]: 2025-09-06T00:26:00.004659Z INFO EnvHandler ExtHandler Routes:None Sep 6 00:26:00.009459 waagent[1597]: 2025-09-06T00:26:00.009385Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 6 00:26:00.010431 waagent[1597]: 2025-09-06T00:26:00.009036Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 6 00:26:00.011477 waagent[1597]: 2025-09-06T00:26:00.011410Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 6 00:26:00.013651 waagent[1597]: 2025-09-06T00:26:00.011250Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 6 00:26:00.017904 waagent[1597]: 2025-09-06T00:26:00.017631Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 6 00:26:00.033268 waagent[1597]: 2025-09-06T00:26:00.033189Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 6 00:26:00.033951 waagent[1597]: 2025-09-06T00:26:00.033880Z INFO MonitorHandler ExtHandler Network interfaces: Sep 6 00:26:00.033951 waagent[1597]: Executing ['ip', '-a', '-o', 'link']: Sep 6 00:26:00.033951 waagent[1597]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 6 00:26:00.033951 waagent[1597]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:76:bc:8c brd ff:ff:ff:ff:ff:ff Sep 6 00:26:00.033951 waagent[1597]: 3: enP29161s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:76:bc:8c brd ff:ff:ff:ff:ff:ff\ altname enP29161p0s2 Sep 6 00:26:00.033951 waagent[1597]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 6 00:26:00.033951 waagent[1597]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 6 00:26:00.033951 waagent[1597]: 2: eth0 inet 10.200.8.12/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 6 00:26:00.033951 waagent[1597]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 6 00:26:00.033951 waagent[1597]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 6 00:26:00.033951 waagent[1597]: 2: eth0 inet6 fe80::7eed:8dff:fe76:bc8c/64 scope link \ valid_lft forever preferred_lft forever Sep 6 00:26:00.081470 waagent[1597]: 2025-09-06T00:26:00.081392Z INFO ExtHandler ExtHandler Sep 6 00:26:00.081901 waagent[1597]: 2025-09-06T00:26:00.081813Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 36c8128b-0c1e-4464-a5df-384f4d7d19a1 correlation 860d3ab6-f22f-42d5-b1cc-408b096e79a7 created: 2025-09-06T00:24:26.299530Z] Sep 6 00:26:00.083395 waagent[1597]: 2025-09-06T00:26:00.083318Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 6 00:26:00.086286 waagent[1597]: 2025-09-06T00:26:00.086213Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms] Sep 6 00:26:00.108942 waagent[1597]: 2025-09-06T00:26:00.108885Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 6 00:26:00.111961 waagent[1597]: 2025-09-06T00:26:00.111895Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 8A688138-7C09-45A9-9EFC-AB3A7053930A;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 6 00:26:00.188056 systemd[1]: Started kubelet.service. Sep 6 00:26:00.768261 waagent[1597]: 2025-09-06T00:26:00.768176Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 6 00:26:00.800651 waagent[1597]: 2025-09-06T00:26:00.800572Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: Sep 6 00:26:00.800651 waagent[1597]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:26:00.800651 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:26:00.800651 waagent[1597]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:26:00.800651 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:26:00.800651 waagent[1597]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:26:00.800651 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:26:00.800651 waagent[1597]: 100 16165 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 00:26:00.814086 kubelet[1633]: E0906 00:26:00.814041 1633 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:26:00.817908 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:26:00.818072 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:26:00.851301 waagent[1597]: 2025-09-06T00:26:00.851196Z INFO EnvHandler ExtHandler The firewall was setup successfully: Sep 6 00:26:00.851301 waagent[1597]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:26:00.851301 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:26:00.851301 waagent[1597]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:26:00.851301 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:26:00.851301 waagent[1597]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:26:00.851301 waagent[1597]: pkts bytes target prot opt in out source destination Sep 6 00:26:00.851301 waagent[1597]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 6 00:26:00.851301 waagent[1597]: 1 52 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 00:26:00.851301 waagent[1597]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 6 00:26:00.852720 waagent[1597]: 2025-09-06T00:26:00.852656Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 6 00:26:10.833593 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 00:26:10.833906 systemd[1]: Stopped kubelet.service. Sep 6 00:26:10.835621 systemd[1]: Starting kubelet.service... Sep 6 00:26:10.930391 systemd[1]: Started kubelet.service. Sep 6 00:26:11.637594 kubelet[1656]: E0906 00:26:11.637541 1656 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:26:11.639239 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:26:11.639404 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:26:13.063969 systemd[1]: Created slice system-sshd.slice. Sep 6 00:26:13.066313 systemd[1]: Started sshd@0-10.200.8.12:22-10.200.16.10:55158.service. Sep 6 00:26:14.055328 sshd[1662]: Accepted publickey for core from 10.200.16.10 port 55158 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:26:14.057057 sshd[1662]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:26:14.062435 systemd[1]: Started session-3.scope. Sep 6 00:26:14.063065 systemd-logind[1400]: New session 3 of user core. Sep 6 00:26:14.606733 systemd[1]: Started sshd@1-10.200.8.12:22-10.200.16.10:55174.service. Sep 6 00:26:15.244714 sshd[1667]: Accepted publickey for core from 10.200.16.10 port 55174 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:26:15.246407 sshd[1667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:26:15.251421 systemd-logind[1400]: New session 4 of user core. Sep 6 00:26:15.252052 systemd[1]: Started session-4.scope. Sep 6 00:26:15.696796 sshd[1667]: pam_unix(sshd:session): session closed for user core Sep 6 00:26:15.700183 systemd[1]: sshd@1-10.200.8.12:22-10.200.16.10:55174.service: Deactivated successfully. Sep 6 00:26:15.701219 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 00:26:15.701997 systemd-logind[1400]: Session 4 logged out. Waiting for processes to exit. Sep 6 00:26:15.702813 systemd-logind[1400]: Removed session 4. Sep 6 00:26:15.803641 systemd[1]: Started sshd@2-10.200.8.12:22-10.200.16.10:55190.service. Sep 6 00:26:16.440948 sshd[1673]: Accepted publickey for core from 10.200.16.10 port 55190 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:26:16.442410 sshd[1673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:26:16.446896 systemd-logind[1400]: New session 5 of user core. Sep 6 00:26:16.447233 systemd[1]: Started session-5.scope. Sep 6 00:26:16.893105 sshd[1673]: pam_unix(sshd:session): session closed for user core Sep 6 00:26:16.896489 systemd[1]: sshd@2-10.200.8.12:22-10.200.16.10:55190.service: Deactivated successfully. Sep 6 00:26:16.897500 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 00:26:16.898309 systemd-logind[1400]: Session 5 logged out. Waiting for processes to exit. Sep 6 00:26:16.899251 systemd-logind[1400]: Removed session 5. Sep 6 00:26:16.999742 systemd[1]: Started sshd@3-10.200.8.12:22-10.200.16.10:55200.service. Sep 6 00:26:17.637922 sshd[1679]: Accepted publickey for core from 10.200.16.10 port 55200 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:26:17.639525 sshd[1679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:26:17.644295 systemd[1]: Started session-6.scope. Sep 6 00:26:17.644913 systemd-logind[1400]: New session 6 of user core. Sep 6 00:26:18.094756 sshd[1679]: pam_unix(sshd:session): session closed for user core Sep 6 00:26:18.098069 systemd[1]: sshd@3-10.200.8.12:22-10.200.16.10:55200.service: Deactivated successfully. Sep 6 00:26:18.099003 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 00:26:18.099634 systemd-logind[1400]: Session 6 logged out. Waiting for processes to exit. Sep 6 00:26:18.100440 systemd-logind[1400]: Removed session 6. Sep 6 00:26:18.201040 systemd[1]: Started sshd@4-10.200.8.12:22-10.200.16.10:55216.service. Sep 6 00:26:18.838271 sshd[1685]: Accepted publickey for core from 10.200.16.10 port 55216 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:26:18.839729 sshd[1685]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:26:18.844706 systemd[1]: Started session-7.scope. Sep 6 00:26:18.845371 systemd-logind[1400]: New session 7 of user core. Sep 6 00:26:19.445186 sudo[1688]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 00:26:19.445586 sudo[1688]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:26:19.469275 dbus-daemon[1390]: \xd0="\u0001\xeeU: received setenforce notice (enforcing=-2034781600) Sep 6 00:26:19.471344 sudo[1688]: pam_unix(sudo:session): session closed for user root Sep 6 00:26:19.763677 sshd[1685]: pam_unix(sshd:session): session closed for user core Sep 6 00:26:19.767489 systemd[1]: sshd@4-10.200.8.12:22-10.200.16.10:55216.service: Deactivated successfully. Sep 6 00:26:19.768411 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 00:26:19.769104 systemd-logind[1400]: Session 7 logged out. Waiting for processes to exit. Sep 6 00:26:19.769918 systemd-logind[1400]: Removed session 7. Sep 6 00:26:19.870526 systemd[1]: Started sshd@5-10.200.8.12:22-10.200.16.10:55220.service. Sep 6 00:26:20.508850 sshd[1692]: Accepted publickey for core from 10.200.16.10 port 55220 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:26:20.521114 sshd[1692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:26:20.525799 systemd[1]: Started session-8.scope. Sep 6 00:26:20.526419 systemd-logind[1400]: New session 8 of user core. Sep 6 00:26:20.859069 sudo[1696]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 00:26:20.859365 sudo[1696]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:26:20.862194 sudo[1696]: pam_unix(sudo:session): session closed for user root Sep 6 00:26:20.866772 sudo[1695]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 00:26:20.867069 sudo[1695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:26:20.875774 systemd[1]: Stopping audit-rules.service... Sep 6 00:26:20.876000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:26:20.877955 auditctl[1699]: No rules Sep 6 00:26:20.885632 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 6 00:26:20.885700 kernel: audit: type=1305 audit(1757118380.876:226): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:26:20.880071 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 00:26:20.880246 systemd[1]: Stopped audit-rules.service. Sep 6 00:26:20.881848 systemd[1]: Starting audit-rules.service... Sep 6 00:26:20.876000 audit[1699]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa1d26330 a2=420 a3=0 items=0 ppid=1 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:20.876000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:26:20.904407 kernel: audit: type=1300 audit(1757118380.876:226): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa1d26330 a2=420 a3=0 items=0 ppid=1 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:20.904481 kernel: audit: type=1327 audit(1757118380.876:226): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:26:20.904533 kernel: audit: type=1131 audit(1757118380.879:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:20.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:20.904800 augenrules[1716]: No rules Sep 6 00:26:20.905719 systemd[1]: Finished audit-rules.service. Sep 6 00:26:20.909323 sudo[1695]: pam_unix(sudo:session): session closed for user root Sep 6 00:26:20.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:20.913845 kernel: audit: type=1130 audit(1757118380.905:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:20.908000 audit[1695]: USER_END pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:20.923849 kernel: audit: type=1106 audit(1757118380.908:229): pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:20.908000 audit[1695]: CRED_DISP pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:20.933853 kernel: audit: type=1104 audit(1757118380.908:230): pid=1695 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:21.013344 sshd[1692]: pam_unix(sshd:session): session closed for user core Sep 6 00:26:21.014000 audit[1692]: USER_END pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:21.016843 systemd[1]: sshd@5-10.200.8.12:22-10.200.16.10:55220.service: Deactivated successfully. Sep 6 00:26:21.017861 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 00:26:21.019155 systemd-logind[1400]: Session 8 logged out. Waiting for processes to exit. Sep 6 00:26:21.020068 systemd-logind[1400]: Removed session 8. Sep 6 00:26:21.014000 audit[1692]: CRED_DISP pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:21.040593 kernel: audit: type=1106 audit(1757118381.014:231): pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:21.040655 kernel: audit: type=1104 audit(1757118381.014:232): pid=1692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:21.040682 kernel: audit: type=1131 audit(1757118381.016:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.12:22-10.200.16.10:55220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:21.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.12:22-10.200.16.10:55220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:21.120515 systemd[1]: Started sshd@6-10.200.8.12:22-10.200.16.10:51638.service. Sep 6 00:26:21.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.16.10:51638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:21.647769 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 00:26:21.648194 systemd[1]: Stopped kubelet.service. Sep 6 00:26:21.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:21.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:21.650349 systemd[1]: Starting kubelet.service... Sep 6 00:26:21.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:21.746010 systemd[1]: Started kubelet.service. Sep 6 00:26:21.758000 audit[1722]: USER_ACCT pid=1722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:21.759314 sshd[1722]: Accepted publickey for core from 10.200.16.10 port 51638 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:26:21.759000 audit[1722]: CRED_ACQ pid=1722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:21.759000 audit[1722]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5fbc0330 a2=3 a3=0 items=0 ppid=1 pid=1722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:21.759000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:26:21.760857 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:26:21.766751 systemd[1]: Started session-9.scope. Sep 6 00:26:21.767891 systemd-logind[1400]: New session 9 of user core. Sep 6 00:26:21.773000 audit[1722]: USER_START pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:21.775000 audit[1734]: CRED_ACQ pid=1734 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:22.107000 audit[1735]: USER_ACCT pid=1735 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:22.108731 sudo[1735]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 00:26:22.108000 audit[1735]: CRED_REFR pid=1735 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:22.109114 sudo[1735]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:26:22.110000 audit[1735]: USER_START pid=1735 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:22.422944 systemd[1]: Starting coreos-metadata.service... Sep 6 00:26:22.431472 kubelet[1728]: E0906 00:26:22.431425 1728 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:26:22.432772 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:26:22.432950 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:26:22.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:26:25.911575 coreos-metadata[1739]: Sep 06 00:26:25.911 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 6 00:26:25.977638 kernel: kauditd_printk_skb: 15 callbacks suppressed Sep 6 00:26:25.977701 kernel: audit: type=1130 audit(1757118385.970:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:25.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:25.970649 systemd[1]: Finished coreos-metadata.service. Sep 6 00:26:25.978030 coreos-metadata[1739]: Sep 06 00:26:25.914 INFO Fetch successful Sep 6 00:26:25.978030 coreos-metadata[1739]: Sep 06 00:26:25.914 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 6 00:26:25.978030 coreos-metadata[1739]: Sep 06 00:26:25.916 INFO Fetch successful Sep 6 00:26:25.978030 coreos-metadata[1739]: Sep 06 00:26:25.916 INFO Fetching http://168.63.129.16/machine/03f513fe-43c6-4829-8c9b-301d04d6a330/3e178ef1%2D3c13%2D490c%2Dbba2%2Dc1fa75c10a5c.%5Fci%2D3510.3.8%2Dn%2D4e3667f87b?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 6 00:26:25.978030 coreos-metadata[1739]: Sep 06 00:26:25.918 INFO Fetch successful Sep 6 00:26:25.978030 coreos-metadata[1739]: Sep 06 00:26:25.952 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 6 00:26:25.978030 coreos-metadata[1739]: Sep 06 00:26:25.962 INFO Fetch successful Sep 6 00:26:26.468604 systemd[1]: Stopped kubelet.service. Sep 6 00:26:26.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:26.474026 systemd[1]: Starting kubelet.service... Sep 6 00:26:26.479331 kernel: audit: type=1130 audit(1757118386.468:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:26.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:26.490940 kernel: audit: type=1131 audit(1757118386.471:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:26.516532 systemd[1]: Reloading. Sep 6 00:26:26.615411 /usr/lib/systemd/system-generators/torcx-generator[1794]: time="2025-09-06T00:26:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:26:26.628545 /usr/lib/systemd/system-generators/torcx-generator[1794]: time="2025-09-06T00:26:26Z" level=info msg="torcx already run" Sep 6 00:26:26.724584 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:26:26.724612 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:26:26.741598 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.854742 kernel: audit: type=1400 audit(1757118386.823:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.854827 kernel: audit: type=1400 audit(1757118386.823:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.854863 kernel: audit: type=1400 audit(1757118386.823:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.879016 kernel: audit: type=1400 audit(1757118386.823:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.879091 kernel: audit: type=1400 audit(1757118386.823:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902611 kernel: audit: type=1400 audit(1757118386.823:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit: BPF prog-id=47 op=LOAD Sep 6 00:26:26.842000 audit: BPF prog-id=39 op=UNLOAD Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.915895 kernel: audit: type=1400 audit(1757118386.823:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit: BPF prog-id=48 op=LOAD Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit: BPF prog-id=49 op=LOAD Sep 6 00:26:26.889000 audit: BPF prog-id=30 op=UNLOAD Sep 6 00:26:26.889000 audit: BPF prog-id=31 op=UNLOAD Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit: BPF prog-id=50 op=LOAD Sep 6 00:26:26.902000 audit: BPF prog-id=46 op=UNLOAD Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.914000 audit: BPF prog-id=51 op=LOAD Sep 6 00:26:26.914000 audit: BPF prog-id=44 op=UNLOAD Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit: BPF prog-id=52 op=LOAD Sep 6 00:26:26.917000 audit: BPF prog-id=41 op=UNLOAD Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit: BPF prog-id=53 op=LOAD Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.918000 audit: BPF prog-id=54 op=LOAD Sep 6 00:26:26.918000 audit: BPF prog-id=42 op=UNLOAD Sep 6 00:26:26.918000 audit: BPF prog-id=43 op=UNLOAD Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit: BPF prog-id=55 op=LOAD Sep 6 00:26:26.919000 audit: BPF prog-id=33 op=UNLOAD Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit: BPF prog-id=56 op=LOAD Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.919000 audit: BPF prog-id=57 op=LOAD Sep 6 00:26:26.919000 audit: BPF prog-id=34 op=UNLOAD Sep 6 00:26:26.919000 audit: BPF prog-id=35 op=UNLOAD Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit: BPF prog-id=58 op=LOAD Sep 6 00:26:26.921000 audit: BPF prog-id=36 op=UNLOAD Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit: BPF prog-id=59 op=LOAD Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.921000 audit: BPF prog-id=60 op=LOAD Sep 6 00:26:26.921000 audit: BPF prog-id=37 op=UNLOAD Sep 6 00:26:26.921000 audit: BPF prog-id=38 op=UNLOAD Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:26.922000 audit: BPF prog-id=61 op=LOAD Sep 6 00:26:26.922000 audit: BPF prog-id=40 op=UNLOAD Sep 6 00:26:26.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:26.943087 systemd[1]: Started kubelet.service. Sep 6 00:26:26.945518 systemd[1]: Stopping kubelet.service... Sep 6 00:26:26.945818 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 00:26:26.946513 systemd[1]: Stopped kubelet.service. Sep 6 00:26:26.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:26.948429 systemd[1]: Starting kubelet.service... Sep 6 00:26:26.997247 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Sep 6 00:26:32.197954 kernel: kauditd_printk_skb: 167 callbacks suppressed Sep 6 00:26:32.198156 kernel: audit: type=1130 audit(1757118392.185:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:32.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:32.181361 systemd[1]: Started kubelet.service. Sep 6 00:26:32.589664 kubelet[1863]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:26:32.589664 kubelet[1863]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 00:26:32.589664 kubelet[1863]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:26:32.590231 kubelet[1863]: I0906 00:26:32.589844 1863 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 00:26:32.867690 kubelet[1863]: I0906 00:26:32.867571 1863 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 6 00:26:32.867690 kubelet[1863]: I0906 00:26:32.867601 1863 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 00:26:32.868245 kubelet[1863]: I0906 00:26:32.868213 1863 server.go:954] "Client rotation is on, will bootstrap in background" Sep 6 00:26:32.892119 kubelet[1863]: I0906 00:26:32.891296 1863 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 00:26:32.898195 kubelet[1863]: E0906 00:26:32.898157 1863 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 00:26:32.898195 kubelet[1863]: I0906 00:26:32.898183 1863 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 00:26:32.903349 kubelet[1863]: I0906 00:26:32.903320 1863 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 00:26:32.903585 kubelet[1863]: I0906 00:26:32.903555 1863 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 00:26:32.903817 kubelet[1863]: I0906 00:26:32.903583 1863 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.8.12","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 00:26:32.903994 kubelet[1863]: I0906 00:26:32.903852 1863 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 00:26:32.903994 kubelet[1863]: I0906 00:26:32.903870 1863 container_manager_linux.go:304] "Creating device plugin manager" Sep 6 00:26:32.904094 kubelet[1863]: I0906 00:26:32.904000 1863 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:26:32.907260 kubelet[1863]: I0906 00:26:32.907239 1863 kubelet.go:446] "Attempting to sync node with API server" Sep 6 00:26:32.907355 kubelet[1863]: I0906 00:26:32.907271 1863 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 00:26:32.907355 kubelet[1863]: I0906 00:26:32.907296 1863 kubelet.go:352] "Adding apiserver pod source" Sep 6 00:26:32.907355 kubelet[1863]: I0906 00:26:32.907309 1863 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 00:26:32.918496 kubelet[1863]: E0906 00:26:32.918455 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:32.919821 kubelet[1863]: E0906 00:26:32.919502 1863 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:32.919960 kubelet[1863]: I0906 00:26:32.919930 1863 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 00:26:32.920528 kubelet[1863]: I0906 00:26:32.920507 1863 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 6 00:26:32.923435 kubelet[1863]: W0906 00:26:32.923411 1863 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 00:26:32.928614 kubelet[1863]: I0906 00:26:32.928594 1863 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 00:26:32.928702 kubelet[1863]: I0906 00:26:32.928636 1863 server.go:1287] "Started kubelet" Sep 6 00:26:32.929654 kubelet[1863]: W0906 00:26:32.929630 1863 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.8.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 6 00:26:32.929808 kubelet[1863]: E0906 00:26:32.929778 1863 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.200.8.12\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 6 00:26:32.930735 kubelet[1863]: I0906 00:26:32.930407 1863 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 00:26:32.939000 audit[1863]: AVC avc: denied { mac_admin } for pid=1863 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.940730 1863 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.940781 1863 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.940860 1863 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.946743 1863 server.go:479] "Adding debug handlers to kubelet server" Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.947763 1863 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.949202 1863 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 00:26:32.954819 kubelet[1863]: E0906 00:26:32.949679 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.952488 1863 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 00:26:32.954819 kubelet[1863]: I0906 00:26:32.952536 1863 reconciler.go:26] "Reconciler: start to sync state" Sep 6 00:26:32.955245 kernel: audit: type=1400 audit(1757118392.939:425): avc: denied { mac_admin } for pid=1863 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:32.939000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:26:32.958976 kubelet[1863]: I0906 00:26:32.955553 1863 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 00:26:32.958976 kubelet[1863]: I0906 00:26:32.955771 1863 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 00:26:32.939000 audit[1863]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00089b950 a1=c000843d58 a2=c00089b920 a3=25 items=0 ppid=1 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.971916 kubelet[1863]: I0906 00:26:32.963495 1863 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 00:26:32.973594 kubelet[1863]: I0906 00:26:32.973577 1863 factory.go:221] Registration of the containerd container factory successfully Sep 6 00:26:32.973689 kubelet[1863]: I0906 00:26:32.973681 1863 factory.go:221] Registration of the systemd container factory successfully Sep 6 00:26:32.980954 kernel: audit: type=1401 audit(1757118392.939:425): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:26:32.981403 kernel: audit: type=1300 audit(1757118392.939:425): arch=c000003e syscall=188 success=no exit=-22 a0=c00089b950 a1=c000843d58 a2=c00089b920 a3=25 items=0 ppid=1 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.981437 kernel: audit: type=1327 audit(1757118392.939:425): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:26:32.939000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:26:32.939000 audit[1863]: AVC avc: denied { mac_admin } for pid=1863 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:33.001703 kubelet[1863]: I0906 00:26:33.001349 1863 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 00:26:33.001703 kubelet[1863]: I0906 00:26:33.001364 1863 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 00:26:33.001703 kubelet[1863]: I0906 00:26:33.001380 1863 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:26:33.010852 kernel: audit: type=1400 audit(1757118392.939:426): avc: denied { mac_admin } for pid=1863 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:32.939000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:26:33.013704 kubelet[1863]: E0906 00:26:33.013674 1863 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.12\" not found" node="10.200.8.12" Sep 6 00:26:33.018286 kernel: audit: type=1401 audit(1757118392.939:426): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:26:33.018684 kernel: audit: type=1300 audit(1757118392.939:426): arch=c000003e syscall=188 success=no exit=-22 a0=c000373f80 a1=c000843d70 a2=c00089b9e0 a3=25 items=0 ppid=1 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.939000 audit[1863]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000373f80 a1=c000843d70 a2=c00089b9e0 a3=25 items=0 ppid=1 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.939000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:26:33.050163 kubelet[1863]: E0906 00:26:33.050128 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.051048 kernel: audit: type=1327 audit(1757118392.939:426): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:26:33.051120 kernel: audit: type=1325 audit(1757118392.943:427): table=mangle:7 family=2 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:32.943000 audit[1876]: NETFILTER_CFG table=mangle:7 family=2 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:32.943000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe662eec40 a2=0 a3=7ffe662eec2c items=0 ppid=1863 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:26:32.944000 audit[1877]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:32.944000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe790b6750 a2=0 a3=7ffe790b673c items=0 ppid=1863 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:26:32.949000 audit[1879]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:32.949000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6516fd90 a2=0 a3=7ffc6516fd7c items=0 ppid=1863 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:26:32.952000 audit[1881]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:32.952000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeb23053d0 a2=0 a3=7ffeb23053bc items=0 ppid=1863 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:32.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:26:33.150876 kubelet[1863]: E0906 00:26:33.150694 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.225104 kubelet[1863]: I0906 00:26:33.225071 1863 policy_none.go:49] "None policy: Start" Sep 6 00:26:33.225104 kubelet[1863]: I0906 00:26:33.225106 1863 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 00:26:33.225330 kubelet[1863]: I0906 00:26:33.225129 1863 state_mem.go:35] "Initializing new in-memory state store" Sep 6 00:26:33.236825 systemd[1]: Created slice kubepods.slice. Sep 6 00:26:33.237000 audit[1889]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:33.237000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe1c5fadb0 a2=0 a3=7ffe1c5fad9c items=0 ppid=1863 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 00:26:33.238864 kubelet[1863]: I0906 00:26:33.238788 1863 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 6 00:26:33.238000 audit[1890]: NETFILTER_CFG table=mangle:12 family=10 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:33.238000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1a79a870 a2=0 a3=7fff1a79a85c items=0 ppid=1863 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:26:33.239949 kubelet[1863]: I0906 00:26:33.239847 1863 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 6 00:26:33.239949 kubelet[1863]: I0906 00:26:33.239872 1863 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 6 00:26:33.239949 kubelet[1863]: I0906 00:26:33.239895 1863 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 00:26:33.239949 kubelet[1863]: I0906 00:26:33.239904 1863 kubelet.go:2382] "Starting kubelet main sync loop" Sep 6 00:26:33.240110 kubelet[1863]: E0906 00:26:33.240004 1863 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 00:26:33.240000 audit[1891]: NETFILTER_CFG table=mangle:13 family=2 entries=1 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:33.240000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd779cdd0 a2=0 a3=7ffdd779cdbc items=0 ppid=1863 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:26:33.241000 audit[1892]: NETFILTER_CFG table=nat:14 family=2 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:33.241000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffea25f9de0 a2=0 a3=7ffea25f9dcc items=0 ppid=1863 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:26:33.242000 audit[1893]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:33.242000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd27848700 a2=0 a3=7ffd278486ec items=0 ppid=1863 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:26:33.243000 audit[1894]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:33.243000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe338093e0 a2=0 a3=7ffe338093cc items=0 ppid=1863 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:26:33.244000 audit[1895]: NETFILTER_CFG table=nat:17 family=10 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:33.244000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd435ee630 a2=0 a3=7ffd435ee61c items=0 ppid=1863 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:26:33.245000 audit[1896]: NETFILTER_CFG table=filter:18 family=10 entries=2 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:33.245000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcf2fef710 a2=0 a3=7ffcf2fef6fc items=0 ppid=1863 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:26:33.251494 kubelet[1863]: E0906 00:26:33.251473 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.251912 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 00:26:33.255021 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 00:26:33.262067 kubelet[1863]: I0906 00:26:33.262036 1863 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 6 00:26:33.261000 audit[1863]: AVC avc: denied { mac_admin } for pid=1863 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:33.261000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:26:33.261000 audit[1863]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c215c0 a1=c000c4b1b8 a2=c000c21590 a3=25 items=0 ppid=1 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:33.261000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:26:33.262387 kubelet[1863]: I0906 00:26:33.262097 1863 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 6 00:26:33.262387 kubelet[1863]: I0906 00:26:33.262215 1863 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 00:26:33.262387 kubelet[1863]: I0906 00:26:33.262229 1863 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 00:26:33.262850 kubelet[1863]: I0906 00:26:33.262764 1863 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 00:26:33.268581 kubelet[1863]: E0906 00:26:33.268560 1863 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 00:26:33.268680 kubelet[1863]: E0906 00:26:33.268606 1863 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.12\" not found" Sep 6 00:26:33.340461 kubelet[1863]: E0906 00:26:33.340416 1863 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.12" not found Sep 6 00:26:33.363227 kubelet[1863]: I0906 00:26:33.363191 1863 kubelet_node_status.go:75] "Attempting to register node" node="10.200.8.12" Sep 6 00:26:33.369014 kubelet[1863]: I0906 00:26:33.368987 1863 kubelet_node_status.go:78] "Successfully registered node" node="10.200.8.12" Sep 6 00:26:33.369014 kubelet[1863]: E0906 00:26:33.369015 1863 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.200.8.12\": node \"10.200.8.12\" not found" Sep 6 00:26:33.380423 kubelet[1863]: E0906 00:26:33.380397 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.481330 kubelet[1863]: E0906 00:26:33.481191 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.582225 kubelet[1863]: E0906 00:26:33.582119 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.683154 kubelet[1863]: E0906 00:26:33.683101 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.737000 audit[1735]: USER_END pid=1735 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:33.737000 audit[1735]: CRED_DISP pid=1735 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:26:33.738441 sudo[1735]: pam_unix(sudo:session): session closed for user root Sep 6 00:26:33.783944 kubelet[1863]: E0906 00:26:33.783891 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.852008 sshd[1722]: pam_unix(sshd:session): session closed for user core Sep 6 00:26:33.852000 audit[1722]: USER_END pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:33.853000 audit[1722]: CRED_DISP pid=1722 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:26:33.855578 systemd[1]: sshd@6-10.200.8.12:22-10.200.16.10:51638.service: Deactivated successfully. Sep 6 00:26:33.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.12:22-10.200.16.10:51638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:26:33.856623 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 00:26:33.857339 systemd-logind[1400]: Session 9 logged out. Waiting for processes to exit. Sep 6 00:26:33.858160 systemd-logind[1400]: Removed session 9. Sep 6 00:26:33.869982 kubelet[1863]: I0906 00:26:33.869941 1863 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 6 00:26:33.870140 kubelet[1863]: W0906 00:26:33.870119 1863 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 00:26:33.870207 kubelet[1863]: W0906 00:26:33.870161 1863 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 00:26:33.870255 kubelet[1863]: W0906 00:26:33.870223 1863 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 00:26:33.884620 kubelet[1863]: E0906 00:26:33.884554 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:33.919255 kubelet[1863]: E0906 00:26:33.919217 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:33.985795 kubelet[1863]: E0906 00:26:33.985690 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:34.086697 kubelet[1863]: E0906 00:26:34.086659 1863 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.12\" not found" Sep 6 00:26:34.173386 update_engine[1404]: I0906 00:26:34.173313 1404 update_attempter.cc:509] Updating boot flags... Sep 6 00:26:34.188425 kubelet[1863]: I0906 00:26:34.188395 1863 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 6 00:26:34.188845 env[1416]: time="2025-09-06T00:26:34.188784729Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 00:26:34.189213 kubelet[1863]: I0906 00:26:34.189091 1863 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 6 00:26:34.916395 kubelet[1863]: I0906 00:26:34.916351 1863 apiserver.go:52] "Watching apiserver" Sep 6 00:26:34.920545 kubelet[1863]: E0906 00:26:34.920170 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:34.921567 kubelet[1863]: E0906 00:26:34.921505 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:34.926483 systemd[1]: Created slice kubepods-besteffort-pod14e500ab_eceb_4721_86ce_dfa21c571706.slice. Sep 6 00:26:34.940021 systemd[1]: Created slice kubepods-besteffort-pod22046585_3e75_4e6d_92ac_3c84ef4be91e.slice. Sep 6 00:26:34.952852 kubelet[1863]: I0906 00:26:34.952807 1863 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 00:26:34.965710 kubelet[1863]: I0906 00:26:34.965683 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/22046585-3e75-4e6d-92ac-3c84ef4be91e-xtables-lock\") pod \"kube-proxy-gq2gg\" (UID: \"22046585-3e75-4e6d-92ac-3c84ef4be91e\") " pod="kube-system/kube-proxy-gq2gg" Sep 6 00:26:34.965874 kubelet[1863]: I0906 00:26:34.965851 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxgm8\" (UniqueName: \"kubernetes.io/projected/22046585-3e75-4e6d-92ac-3c84ef4be91e-kube-api-access-xxgm8\") pod \"kube-proxy-gq2gg\" (UID: \"22046585-3e75-4e6d-92ac-3c84ef4be91e\") " pod="kube-system/kube-proxy-gq2gg" Sep 6 00:26:34.965961 kubelet[1863]: I0906 00:26:34.965885 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-flexvol-driver-host\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.965961 kubelet[1863]: I0906 00:26:34.965908 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-var-run-calico\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.965961 kubelet[1863]: I0906 00:26:34.965930 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-xtables-lock\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.965961 kubelet[1863]: I0906 00:26:34.965953 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-77p2q\" (UniqueName: \"kubernetes.io/projected/14e500ab-eceb-4721-86ce-dfa21c571706-kube-api-access-77p2q\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966133 kubelet[1863]: I0906 00:26:34.965974 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e0e1d417-702a-4db0-a4e3-2c2c63621409-varrun\") pod \"csi-node-driver-chlxf\" (UID: \"e0e1d417-702a-4db0-a4e3-2c2c63621409\") " pod="calico-system/csi-node-driver-chlxf" Sep 6 00:26:34.966133 kubelet[1863]: I0906 00:26:34.965995 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/22046585-3e75-4e6d-92ac-3c84ef4be91e-lib-modules\") pod \"kube-proxy-gq2gg\" (UID: \"22046585-3e75-4e6d-92ac-3c84ef4be91e\") " pod="kube-system/kube-proxy-gq2gg" Sep 6 00:26:34.966133 kubelet[1863]: I0906 00:26:34.966018 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t285n\" (UniqueName: \"kubernetes.io/projected/e0e1d417-702a-4db0-a4e3-2c2c63621409-kube-api-access-t285n\") pod \"csi-node-driver-chlxf\" (UID: \"e0e1d417-702a-4db0-a4e3-2c2c63621409\") " pod="calico-system/csi-node-driver-chlxf" Sep 6 00:26:34.966133 kubelet[1863]: I0906 00:26:34.966044 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e0e1d417-702a-4db0-a4e3-2c2c63621409-registration-dir\") pod \"csi-node-driver-chlxf\" (UID: \"e0e1d417-702a-4db0-a4e3-2c2c63621409\") " pod="calico-system/csi-node-driver-chlxf" Sep 6 00:26:34.966133 kubelet[1863]: I0906 00:26:34.966064 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/22046585-3e75-4e6d-92ac-3c84ef4be91e-kube-proxy\") pod \"kube-proxy-gq2gg\" (UID: \"22046585-3e75-4e6d-92ac-3c84ef4be91e\") " pod="kube-system/kube-proxy-gq2gg" Sep 6 00:26:34.966334 kubelet[1863]: I0906 00:26:34.966086 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-cni-log-dir\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966334 kubelet[1863]: I0906 00:26:34.966107 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-cni-net-dir\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966334 kubelet[1863]: I0906 00:26:34.966129 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-var-lib-calico\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966334 kubelet[1863]: I0906 00:26:34.966152 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e0e1d417-702a-4db0-a4e3-2c2c63621409-kubelet-dir\") pod \"csi-node-driver-chlxf\" (UID: \"e0e1d417-702a-4db0-a4e3-2c2c63621409\") " pod="calico-system/csi-node-driver-chlxf" Sep 6 00:26:34.966334 kubelet[1863]: I0906 00:26:34.966176 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-cni-bin-dir\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966540 kubelet[1863]: I0906 00:26:34.966199 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-lib-modules\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966540 kubelet[1863]: I0906 00:26:34.966223 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/14e500ab-eceb-4721-86ce-dfa21c571706-node-certs\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966540 kubelet[1863]: I0906 00:26:34.966247 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/14e500ab-eceb-4721-86ce-dfa21c571706-policysync\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966540 kubelet[1863]: I0906 00:26:34.966267 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/14e500ab-eceb-4721-86ce-dfa21c571706-tigera-ca-bundle\") pod \"calico-node-tsg2b\" (UID: \"14e500ab-eceb-4721-86ce-dfa21c571706\") " pod="calico-system/calico-node-tsg2b" Sep 6 00:26:34.966540 kubelet[1863]: I0906 00:26:34.966289 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e0e1d417-702a-4db0-a4e3-2c2c63621409-socket-dir\") pod \"csi-node-driver-chlxf\" (UID: \"e0e1d417-702a-4db0-a4e3-2c2c63621409\") " pod="calico-system/csi-node-driver-chlxf" Sep 6 00:26:35.067904 kubelet[1863]: I0906 00:26:35.067859 1863 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 00:26:35.071697 kubelet[1863]: E0906 00:26:35.071656 1863 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:26:35.071697 kubelet[1863]: W0906 00:26:35.071688 1863 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:26:35.071954 kubelet[1863]: E0906 00:26:35.071725 1863 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:26:35.081066 kubelet[1863]: E0906 00:26:35.081039 1863 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:26:35.081192 kubelet[1863]: W0906 00:26:35.081064 1863 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:26:35.081192 kubelet[1863]: E0906 00:26:35.081097 1863 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:26:35.096751 kubelet[1863]: E0906 00:26:35.096728 1863 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:26:35.096941 kubelet[1863]: W0906 00:26:35.096921 1863 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:26:35.097061 kubelet[1863]: E0906 00:26:35.097046 1863 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:26:35.097386 kubelet[1863]: E0906 00:26:35.097370 1863 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:26:35.097493 kubelet[1863]: W0906 00:26:35.097480 1863 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:26:35.097574 kubelet[1863]: E0906 00:26:35.097559 1863 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:26:35.099352 kubelet[1863]: E0906 00:26:35.099332 1863 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:26:35.099352 kubelet[1863]: W0906 00:26:35.099347 1863 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:26:35.099479 kubelet[1863]: E0906 00:26:35.099362 1863 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:26:35.241720 env[1416]: time="2025-09-06T00:26:35.239325106Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tsg2b,Uid:14e500ab-eceb-4721-86ce-dfa21c571706,Namespace:calico-system,Attempt:0,}" Sep 6 00:26:35.244479 env[1416]: time="2025-09-06T00:26:35.244436201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gq2gg,Uid:22046585-3e75-4e6d-92ac-3c84ef4be91e,Namespace:kube-system,Attempt:0,}" Sep 6 00:26:35.922081 kubelet[1863]: E0906 00:26:35.921993 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:36.240623 kubelet[1863]: E0906 00:26:36.240373 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:36.923560 kubelet[1863]: E0906 00:26:36.923496 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:37.923696 kubelet[1863]: E0906 00:26:37.923644 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:38.241055 kubelet[1863]: E0906 00:26:38.240383 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:38.739343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount157831328.mount: Deactivated successfully. Sep 6 00:26:38.767129 env[1416]: time="2025-09-06T00:26:38.767078643Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.775885 env[1416]: time="2025-09-06T00:26:38.775847335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.824722 env[1416]: time="2025-09-06T00:26:38.824669995Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.834928 env[1416]: time="2025-09-06T00:26:38.834893586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.840576 env[1416]: time="2025-09-06T00:26:38.840539081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.846242 env[1416]: time="2025-09-06T00:26:38.846207577Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.850960 env[1416]: time="2025-09-06T00:26:38.850926473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.859569 env[1416]: time="2025-09-06T00:26:38.859535565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:38.914872 env[1416]: time="2025-09-06T00:26:38.912389521Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:26:38.914872 env[1416]: time="2025-09-06T00:26:38.912420121Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:26:38.914872 env[1416]: time="2025-09-06T00:26:38.912429921Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:26:38.914872 env[1416]: time="2025-09-06T00:26:38.912630421Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a pid=1955 runtime=io.containerd.runc.v2 Sep 6 00:26:38.924429 kubelet[1863]: E0906 00:26:38.924369 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:38.936519 systemd[1]: Started cri-containerd-7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a.scope. Sep 6 00:26:38.971786 kernel: kauditd_printk_skb: 44 callbacks suppressed Sep 6 00:26:38.971920 kernel: audit: type=1400 audit(1757118398.955:445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.984855 kernel: audit: type=1400 audit(1757118398.955:446): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.999095 env[1416]: time="2025-09-06T00:26:38.987797358Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:26:38.999095 env[1416]: time="2025-09-06T00:26:38.987892458Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:26:38.999095 env[1416]: time="2025-09-06T00:26:38.987927058Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:26:38.999095 env[1416]: time="2025-09-06T00:26:38.988173058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96d9babb9c04e226e170bad5a5f2ffacdcd3ed1f8f9cee712cb928b61cf4ae71 pid=1992 runtime=io.containerd.runc.v2 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.011671 kernel: audit: type=1400 audit(1757118398.955:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.011806 kernel: audit: type=1400 audit(1757118398.955:448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.011852 kernel: audit: type=1400 audit(1757118398.955:449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.013294 systemd[1]: Started cri-containerd-96d9babb9c04e226e170bad5a5f2ffacdcd3ed1f8f9cee712cb928b61cf4ae71.scope. Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.043025 kernel: audit: type=1400 audit(1757118398.955:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.056059 env[1416]: time="2025-09-06T00:26:39.056024704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tsg2b,Uid:14e500ab-eceb-4721-86ce-dfa21c571706,Namespace:calico-system,Attempt:0,} returns sandbox id \"7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a\"" Sep 6 00:26:39.073740 kernel: audit: type=1400 audit(1757118398.955:451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.073963 kernel: audit: type=1400 audit(1757118398.955:452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.073995 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 00:26:39.074018 kernel: audit: type=1400 audit(1757118398.955:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.075760 env[1416]: time="2025-09-06T00:26:39.075721988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 00:26:38.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.971000 audit: BPF prog-id=62 op=LOAD Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1955 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:38.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386561663534366262613737316531333564313166333363663161 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1955 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:38.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386561663534366262613737316531333564313166333363663161 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.973000 audit: BPF prog-id=63 op=LOAD Sep 6 00:26:38.973000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025390 items=0 ppid=1955 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:38.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386561663534366262613737316531333564313166333363663161 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit: BPF prog-id=64 op=LOAD Sep 6 00:26:38.985000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253d8 items=0 ppid=1955 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:38.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386561663534366262613737316531333564313166333363663161 Sep 6 00:26:38.985000 audit: BPF prog-id=64 op=UNLOAD Sep 6 00:26:38.985000 audit: BPF prog-id=63 op=UNLOAD Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:38.985000 audit: BPF prog-id=65 op=LOAD Sep 6 00:26:38.985000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257e8 items=0 ppid=1955 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:38.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386561663534366262613737316531333564313166333363663161 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.054000 audit: BPF prog-id=66 op=LOAD Sep 6 00:26:39.073000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.073000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1992 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:39.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643962616262396330346532323665313730626164356135663266 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit: BPF prog-id=67 op=LOAD Sep 6 00:26:39.084000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bf0c0 items=0 ppid=1992 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:39.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643962616262396330346532323665313730626164356135663266 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit: BPF prog-id=68 op=LOAD Sep 6 00:26:39.084000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bf108 items=0 ppid=1992 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:39.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643962616262396330346532323665313730626164356135663266 Sep 6 00:26:39.084000 audit: BPF prog-id=68 op=UNLOAD Sep 6 00:26:39.084000 audit: BPF prog-id=67 op=UNLOAD Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:39.084000 audit: BPF prog-id=69 op=LOAD Sep 6 00:26:39.084000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bf518 items=0 ppid=1992 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:39.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643962616262396330346532323665313730626164356135663266 Sep 6 00:26:39.099996 env[1416]: time="2025-09-06T00:26:39.099574169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gq2gg,Uid:22046585-3e75-4e6d-92ac-3c84ef4be91e,Namespace:kube-system,Attempt:0,} returns sandbox id \"96d9babb9c04e226e170bad5a5f2ffacdcd3ed1f8f9cee712cb928b61cf4ae71\"" Sep 6 00:26:39.924537 kubelet[1863]: E0906 00:26:39.924477 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:40.240665 kubelet[1863]: E0906 00:26:40.240446 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:40.680238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount594485877.mount: Deactivated successfully. Sep 6 00:26:40.845103 env[1416]: time="2025-09-06T00:26:40.845053840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:40.851481 env[1416]: time="2025-09-06T00:26:40.851444235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:40.855493 env[1416]: time="2025-09-06T00:26:40.855458432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:40.858521 env[1416]: time="2025-09-06T00:26:40.858485830Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:40.858988 env[1416]: time="2025-09-06T00:26:40.858956830Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 00:26:40.861482 env[1416]: time="2025-09-06T00:26:40.861006628Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\"" Sep 6 00:26:40.861803 env[1416]: time="2025-09-06T00:26:40.861767928Z" level=info msg="CreateContainer within sandbox \"7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 00:26:40.909989 env[1416]: time="2025-09-06T00:26:40.909944092Z" level=info msg="CreateContainer within sandbox \"7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f\"" Sep 6 00:26:40.910634 env[1416]: time="2025-09-06T00:26:40.910603192Z" level=info msg="StartContainer for \"970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f\"" Sep 6 00:26:40.924964 kubelet[1863]: E0906 00:26:40.924894 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:40.936507 systemd[1]: run-containerd-runc-k8s.io-970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f-runc.98mMMD.mount: Deactivated successfully. Sep 6 00:26:40.944488 systemd[1]: Started cri-containerd-970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f.scope. Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc9830687c8 items=0 ppid=1955 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:40.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303038383932356237376239653665303436333931666161376433 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit: BPF prog-id=70 op=LOAD Sep 6 00:26:40.957000 audit[2040]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003de798 items=0 ppid=1955 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:40.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303038383932356237376239653665303436333931666161376433 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit: BPF prog-id=71 op=LOAD Sep 6 00:26:40.957000 audit[2040]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003de7e8 items=0 ppid=1955 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:40.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303038383932356237376239653665303436333931666161376433 Sep 6 00:26:40.957000 audit: BPF prog-id=71 op=UNLOAD Sep 6 00:26:40.957000 audit: BPF prog-id=70 op=UNLOAD Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:40.957000 audit: BPF prog-id=72 op=LOAD Sep 6 00:26:40.957000 audit[2040]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003de878 items=0 ppid=1955 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:40.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303038383932356237376239653665303436333931666161376433 Sep 6 00:26:40.976883 env[1416]: time="2025-09-06T00:26:40.976815743Z" level=info msg="StartContainer for \"970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f\" returns successfully" Sep 6 00:26:40.983614 systemd[1]: cri-containerd-970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f.scope: Deactivated successfully. Sep 6 00:26:40.986000 audit: BPF prog-id=72 op=UNLOAD Sep 6 00:26:41.127622 env[1416]: time="2025-09-06T00:26:41.127565638Z" level=info msg="shim disconnected" id=970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f Sep 6 00:26:41.127622 env[1416]: time="2025-09-06T00:26:41.127615038Z" level=warning msg="cleaning up after shim disconnected" id=970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f namespace=k8s.io Sep 6 00:26:41.127622 env[1416]: time="2025-09-06T00:26:41.127626838Z" level=info msg="cleaning up dead shim" Sep 6 00:26:41.136346 env[1416]: time="2025-09-06T00:26:41.136305732Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:26:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2079 runtime=io.containerd.runc.v2\n" Sep 6 00:26:41.896268 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-970088925b77b9e6e046391faa7d3a4a12c6ec3c742c7903bec1a6f79118ec7f-rootfs.mount: Deactivated successfully. Sep 6 00:26:41.925063 kubelet[1863]: E0906 00:26:41.925010 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:42.241111 kubelet[1863]: E0906 00:26:42.240989 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:42.386915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount392840898.mount: Deactivated successfully. Sep 6 00:26:42.926031 kubelet[1863]: E0906 00:26:42.925986 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:43.089666 env[1416]: time="2025-09-06T00:26:43.089614234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:43.097083 env[1416]: time="2025-09-06T00:26:43.097033530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d7b94972d43c5d6ce8088a8bcd08614a5ecf2bf04166232c688adcd0b8ed4b12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:43.100304 env[1416]: time="2025-09-06T00:26:43.100267628Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:43.105879 env[1416]: time="2025-09-06T00:26:43.105823324Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:adc1335b480ddd833aac3b0bd20f68ff0f3c3cf7a0bd337933b006d9f5cec40a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:43.106353 env[1416]: time="2025-09-06T00:26:43.106318824Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\" returns image reference \"sha256:d7b94972d43c5d6ce8088a8bcd08614a5ecf2bf04166232c688adcd0b8ed4b12\"" Sep 6 00:26:43.107579 env[1416]: time="2025-09-06T00:26:43.107553823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 00:26:43.109070 env[1416]: time="2025-09-06T00:26:43.109026823Z" level=info msg="CreateContainer within sandbox \"96d9babb9c04e226e170bad5a5f2ffacdcd3ed1f8f9cee712cb928b61cf4ae71\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 00:26:43.139083 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount284714522.mount: Deactivated successfully. Sep 6 00:26:43.151045 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1777743602.mount: Deactivated successfully. Sep 6 00:26:43.162932 env[1416]: time="2025-09-06T00:26:43.162884290Z" level=info msg="CreateContainer within sandbox \"96d9babb9c04e226e170bad5a5f2ffacdcd3ed1f8f9cee712cb928b61cf4ae71\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e1f6b070b744e42312a482123edcf870dbb28537d25aa7b6a656cd7a624a65ea\"" Sep 6 00:26:43.163727 env[1416]: time="2025-09-06T00:26:43.163671789Z" level=info msg="StartContainer for \"e1f6b070b744e42312a482123edcf870dbb28537d25aa7b6a656cd7a624a65ea\"" Sep 6 00:26:43.185475 systemd[1]: Started cri-containerd-e1f6b070b744e42312a482123edcf870dbb28537d25aa7b6a656cd7a624a65ea.scope. Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1bf8718898 items=0 ppid=1992 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663662303730623734346534323331326134383231323365646366 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit: BPF prog-id=73 op=LOAD Sep 6 00:26:43.201000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003a88a8 items=0 ppid=1992 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663662303730623734346534323331326134383231323365646366 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.201000 audit: BPF prog-id=74 op=LOAD Sep 6 00:26:43.201000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003a88f8 items=0 ppid=1992 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663662303730623734346534323331326134383231323365646366 Sep 6 00:26:43.202000 audit: BPF prog-id=74 op=UNLOAD Sep 6 00:26:43.202000 audit: BPF prog-id=73 op=UNLOAD Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:43.202000 audit: BPF prog-id=75 op=LOAD Sep 6 00:26:43.202000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003a8988 items=0 ppid=1992 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663662303730623734346534323331326134383231323365646366 Sep 6 00:26:43.228993 env[1416]: time="2025-09-06T00:26:43.228947350Z" level=info msg="StartContainer for \"e1f6b070b744e42312a482123edcf870dbb28537d25aa7b6a656cd7a624a65ea\" returns successfully" Sep 6 00:26:43.286066 kubelet[1863]: I0906 00:26:43.285985 1863 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-gq2gg" podStartSLOduration=6.2792550590000005 podStartE2EDuration="10.285963815s" podCreationTimestamp="2025-09-06 00:26:33 +0000 UTC" firstStartedPulling="2025-09-06 00:26:39.100683868 +0000 UTC m=+6.914735974" lastFinishedPulling="2025-09-06 00:26:43.107392524 +0000 UTC m=+10.921444730" observedRunningTime="2025-09-06 00:26:43.285822715 +0000 UTC m=+11.099874821" watchObservedRunningTime="2025-09-06 00:26:43.285963815 +0000 UTC m=+11.100015921" Sep 6 00:26:43.348000 audit[2164]: NETFILTER_CFG table=mangle:19 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.348000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c083480 a2=0 a3=7ffd9c08346c items=0 ppid=2116 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:26:43.350000 audit[2165]: NETFILTER_CFG table=mangle:20 family=10 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.350000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7df9f420 a2=0 a3=7ffd7df9f40c items=0 ppid=2116 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:26:43.351000 audit[2167]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.351000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5c2bace0 a2=0 a3=7ffd5c2baccc items=0 ppid=2116 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:26:43.353000 audit[2168]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.353000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1c6d00b0 a2=0 a3=7ffc1c6d009c items=0 ppid=2116 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.354000 audit[2169]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.354000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3e46a9d0 a2=0 a3=7ffe3e46a9bc items=0 ppid=2116 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:26:43.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:26:43.358000 audit[2171]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.358000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4cc40eb0 a2=0 a3=7ffd4cc40e9c items=0 ppid=2116 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:26:43.452000 audit[2172]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.452000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe60f3e6a0 a2=0 a3=7ffe60f3e68c items=0 ppid=2116 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:26:43.457000 audit[2174]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.457000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe46d6d8c0 a2=0 a3=7ffe46d6d8ac items=0 ppid=2116 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 00:26:43.461000 audit[2177]: NETFILTER_CFG table=filter:27 family=2 entries=2 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.461000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcaeffe920 a2=0 a3=7ffcaeffe90c items=0 ppid=2116 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 00:26:43.462000 audit[2178]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.462000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd99be4430 a2=0 a3=7ffd99be441c items=0 ppid=2116 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:26:43.465000 audit[2180]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.465000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd79e00420 a2=0 a3=7ffd79e0040c items=0 ppid=2116 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:26:43.466000 audit[2181]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.466000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6e3b8d90 a2=0 a3=7ffc6e3b8d7c items=0 ppid=2116 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:26:43.468000 audit[2183]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.468000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe09e28e40 a2=0 a3=7ffe09e28e2c items=0 ppid=2116 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:26:43.472000 audit[2186]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.472000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc88760150 a2=0 a3=7ffc8876013c items=0 ppid=2116 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 00:26:43.473000 audit[2187]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.473000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd78ddcac0 a2=0 a3=7ffd78ddcaac items=0 ppid=2116 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:26:43.475000 audit[2189]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.475000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbf6f3540 a2=0 a3=7ffcbf6f352c items=0 ppid=2116 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:26:43.476000 audit[2190]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.476000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff31596540 a2=0 a3=7fff3159652c items=0 ppid=2116 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:26:43.479000 audit[2192]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.479000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff53dd78b0 a2=0 a3=7fff53dd789c items=0 ppid=2116 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:26:43.483000 audit[2195]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.483000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd588b9ff0 a2=0 a3=7ffd588b9fdc items=0 ppid=2116 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:26:43.488000 audit[2198]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.488000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcdc20ca10 a2=0 a3=7ffcdc20c9fc items=0 ppid=2116 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:26:43.489000 audit[2199]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.489000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd7b5866b0 a2=0 a3=7ffd7b58669c items=0 ppid=2116 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:26:43.491000 audit[2201]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.491000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffedbbf6070 a2=0 a3=7ffedbbf605c items=0 ppid=2116 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:26:43.562000 audit[2205]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.562000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe2826be40 a2=0 a3=7ffe2826be2c items=0 ppid=2116 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:26:43.563000 audit[2206]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.563000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeadfbc380 a2=0 a3=7ffeadfbc36c items=0 ppid=2116 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:26:43.565000 audit[2208]: NETFILTER_CFG table=nat:43 family=2 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:26:43.565000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe6c4ecb00 a2=0 a3=7ffe6c4ecaec items=0 ppid=2116 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:26:43.619000 audit[2214]: NETFILTER_CFG table=filter:44 family=2 entries=5 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:26:43.619000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff4adcd3e0 a2=0 a3=7fff4adcd3cc items=0 ppid=2116 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:26:43.675000 audit[2214]: NETFILTER_CFG table=nat:45 family=2 entries=79 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:26:43.675000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=38092 a0=3 a1=7fff4adcd3e0 a2=0 a3=7fff4adcd3cc items=0 ppid=2116 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:26:43.724000 audit[2222]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.724000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc82316ce0 a2=0 a3=7ffc82316ccc items=0 ppid=2116 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:26:43.727000 audit[2224]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.727000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd220ee700 a2=0 a3=7ffd220ee6ec items=0 ppid=2116 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 00:26:43.731000 audit[2227]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.731000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc64e0f2b0 a2=0 a3=7ffc64e0f29c items=0 ppid=2116 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 00:26:43.732000 audit[2228]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.732000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeea20ab90 a2=0 a3=7ffeea20ab7c items=0 ppid=2116 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:26:43.735000 audit[2230]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.735000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffde8ace960 a2=0 a3=7ffde8ace94c items=0 ppid=2116 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:26:43.736000 audit[2231]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.736000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3f4c07c0 a2=0 a3=7fff3f4c07ac items=0 ppid=2116 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:26:43.738000 audit[2233]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.738000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7058fce0 a2=0 a3=7ffd7058fccc items=0 ppid=2116 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 00:26:43.742000 audit[2236]: NETFILTER_CFG table=filter:53 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.742000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdae879d60 a2=0 a3=7ffdae879d4c items=0 ppid=2116 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:26:43.743000 audit[2237]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.743000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe539d69f0 a2=0 a3=7ffe539d69dc items=0 ppid=2116 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:26:43.745000 audit[2239]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.745000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe79a3cfd0 a2=0 a3=7ffe79a3cfbc items=0 ppid=2116 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:26:43.747000 audit[2240]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.747000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9e86ee10 a2=0 a3=7fff9e86edfc items=0 ppid=2116 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:26:43.749000 audit[2242]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.749000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7c6263f0 a2=0 a3=7ffd7c6263dc items=0 ppid=2116 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:26:43.753000 audit[2245]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.753000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb7e6fe40 a2=0 a3=7fffb7e6fe2c items=0 ppid=2116 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:26:43.756000 audit[2248]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.756000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcfa7b6860 a2=0 a3=7ffcfa7b684c items=0 ppid=2116 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 00:26:43.757000 audit[2249]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.757000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea24a5440 a2=0 a3=7ffea24a542c items=0 ppid=2116 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:26:43.759000 audit[2251]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.759000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffed7f29fb0 a2=0 a3=7ffed7f29f9c items=0 ppid=2116 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:26:43.763000 audit[2254]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.763000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcbcfc72b0 a2=0 a3=7ffcbcfc729c items=0 ppid=2116 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:26:43.764000 audit[2255]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.764000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff16a69ee0 a2=0 a3=7fff16a69ecc items=0 ppid=2116 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:26:43.766000 audit[2257]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.766000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd132a1460 a2=0 a3=7ffd132a144c items=0 ppid=2116 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:26:43.768000 audit[2258]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.768000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdff4bafc0 a2=0 a3=7ffdff4bafac items=0 ppid=2116 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:26:43.770000 audit[2260]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.770000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd76cb12e0 a2=0 a3=7ffd76cb12cc items=0 ppid=2116 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:26:43.774000 audit[2263]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:26:43.774000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfc730350 a2=0 a3=7ffdfc73033c items=0 ppid=2116 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:26:43.776000 audit[2265]: NETFILTER_CFG table=filter:68 family=10 entries=3 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:26:43.776000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffcf7ab5e20 a2=0 a3=7ffcf7ab5e0c items=0 ppid=2116 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.776000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:26:43.777000 audit[2265]: NETFILTER_CFG table=nat:69 family=10 entries=7 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:26:43.777000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcf7ab5e20 a2=0 a3=7ffcf7ab5e0c items=0 ppid=2116 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:43.777000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:26:43.927353 kubelet[1863]: E0906 00:26:43.927130 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:44.240851 kubelet[1863]: E0906 00:26:44.240782 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:44.927521 kubelet[1863]: E0906 00:26:44.927449 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:45.928518 kubelet[1863]: E0906 00:26:45.928405 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:46.241873 kubelet[1863]: E0906 00:26:46.241148 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:46.929615 kubelet[1863]: E0906 00:26:46.929548 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:47.664082 env[1416]: time="2025-09-06T00:26:47.664021090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:47.672054 env[1416]: time="2025-09-06T00:26:47.671974653Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:47.674877 env[1416]: time="2025-09-06T00:26:47.674846085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:47.680064 env[1416]: time="2025-09-06T00:26:47.680034122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:26:47.680453 env[1416]: time="2025-09-06T00:26:47.680422740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 00:26:47.682525 env[1416]: time="2025-09-06T00:26:47.682491434Z" level=info msg="CreateContainer within sandbox \"7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 00:26:47.707024 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount715078971.mount: Deactivated successfully. Sep 6 00:26:47.722708 env[1416]: time="2025-09-06T00:26:47.722669672Z" level=info msg="CreateContainer within sandbox \"7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb\"" Sep 6 00:26:47.728757 env[1416]: time="2025-09-06T00:26:47.728717949Z" level=info msg="StartContainer for \"e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb\"" Sep 6 00:26:47.762550 systemd[1]: Started cri-containerd-e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb.scope. Sep 6 00:26:47.795459 kernel: kauditd_printk_skb: 344 callbacks suppressed Sep 6 00:26:47.795615 kernel: audit: type=1400 audit(1757118407.778:544): avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff1d869ca28 items=0 ppid=1955 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:47.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539656162636261366632623238636632326634663662323833333739 Sep 6 00:26:47.830600 kernel: audit: type=1300 audit(1757118407.778:544): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff1d869ca28 items=0 ppid=1955 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:47.842245 kernel: audit: type=1327 audit(1757118407.778:544): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539656162636261366632623238636632326634663662323833333739 Sep 6 00:26:47.842329 kernel: audit: type=1400 audit(1757118407.778:545): avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.860280 kernel: audit: type=1400 audit(1757118407.778:545): avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.860754 env[1416]: time="2025-09-06T00:26:47.860702385Z" level=info msg="StartContainer for \"e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb\" returns successfully" Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.887270 kernel: audit: type=1400 audit(1757118407.778:545): avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.887391 kernel: audit: type=1400 audit(1757118407.778:545): avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.887429 kernel: audit: type=1400 audit(1757118407.778:545): avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.913905 kernel: audit: type=1400 audit(1757118407.778:545): avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.928929 kernel: audit: type=1400 audit(1757118407.778:545): avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.778000 audit: BPF prog-id=76 op=LOAD Sep 6 00:26:47.778000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a6c58 items=0 ppid=1955 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:47.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539656162636261366632623238636632326634663662323833333739 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit: BPF prog-id=77 op=LOAD Sep 6 00:26:47.794000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a6ca8 items=0 ppid=1955 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:47.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539656162636261366632623238636632326634663662323833333739 Sep 6 00:26:47.794000 audit: BPF prog-id=77 op=UNLOAD Sep 6 00:26:47.794000 audit: BPF prog-id=76 op=UNLOAD Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:26:47.794000 audit: BPF prog-id=78 op=LOAD Sep 6 00:26:47.794000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a6d38 items=0 ppid=1955 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:26:47.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539656162636261366632623238636632326634663662323833333739 Sep 6 00:26:47.930791 kubelet[1863]: E0906 00:26:47.930704 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:48.241601 kubelet[1863]: E0906 00:26:48.241163 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:48.704076 systemd[1]: run-containerd-runc-k8s.io-e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb-runc.3esBer.mount: Deactivated successfully. Sep 6 00:26:48.931268 kubelet[1863]: E0906 00:26:48.931218 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:49.636885 env[1416]: time="2025-09-06T00:26:49.636807370Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:26:49.638733 systemd[1]: cri-containerd-e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb.scope: Deactivated successfully. Sep 6 00:26:49.641000 audit: BPF prog-id=78 op=UNLOAD Sep 6 00:26:49.658407 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb-rootfs.mount: Deactivated successfully. Sep 6 00:26:49.713217 kubelet[1863]: I0906 00:26:49.713180 1863 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 00:26:49.932341 kubelet[1863]: E0906 00:26:49.932229 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:50.245664 systemd[1]: Created slice kubepods-besteffort-pode0e1d417_702a_4db0_a4e3_2c2c63621409.slice. Sep 6 00:26:50.249051 env[1416]: time="2025-09-06T00:26:50.249015944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-chlxf,Uid:e0e1d417-702a-4db0-a4e3-2c2c63621409,Namespace:calico-system,Attempt:0,}" Sep 6 00:26:50.933205 kubelet[1863]: E0906 00:26:50.933151 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:51.821104 env[1416]: time="2025-09-06T00:26:51.821048810Z" level=info msg="shim disconnected" id=e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb Sep 6 00:26:51.821104 env[1416]: time="2025-09-06T00:26:51.821096812Z" level=warning msg="cleaning up after shim disconnected" id=e9eabcba6f2b28cf22f4f6b283379fc20ea6d006d7ce0d529205fa67fc5db4cb namespace=k8s.io Sep 6 00:26:51.821104 env[1416]: time="2025-09-06T00:26:51.821111713Z" level=info msg="cleaning up dead shim" Sep 6 00:26:51.829343 env[1416]: time="2025-09-06T00:26:51.829286747Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:26:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2314 runtime=io.containerd.runc.v2\n" Sep 6 00:26:51.891132 env[1416]: time="2025-09-06T00:26:51.891059273Z" level=error msg="Failed to destroy network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:51.894930 env[1416]: time="2025-09-06T00:26:51.893664980Z" level=error msg="encountered an error cleaning up failed sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:51.894930 env[1416]: time="2025-09-06T00:26:51.893732182Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-chlxf,Uid:e0e1d417-702a-4db0-a4e3-2c2c63621409,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:51.895005 kubelet[1863]: E0906 00:26:51.893971 1863 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:51.895005 kubelet[1863]: E0906 00:26:51.894044 1863 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-chlxf" Sep 6 00:26:51.895005 kubelet[1863]: E0906 00:26:51.894072 1863 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-chlxf" Sep 6 00:26:51.893309 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55-shm.mount: Deactivated successfully. Sep 6 00:26:51.895273 kubelet[1863]: E0906 00:26:51.894126 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-chlxf_calico-system(e0e1d417-702a-4db0-a4e3-2c2c63621409)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-chlxf_calico-system(e0e1d417-702a-4db0-a4e3-2c2c63621409)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:51.933896 kubelet[1863]: E0906 00:26:51.933853 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:52.293186 env[1416]: time="2025-09-06T00:26:52.293138287Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 00:26:52.293516 kubelet[1863]: I0906 00:26:52.293492 1863 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:26:52.294080 env[1416]: time="2025-09-06T00:26:52.294044423Z" level=info msg="StopPodSandbox for \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\"" Sep 6 00:26:52.320966 env[1416]: time="2025-09-06T00:26:52.320908791Z" level=error msg="StopPodSandbox for \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\" failed" error="failed to destroy network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:52.321220 kubelet[1863]: E0906 00:26:52.321182 1863 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:26:52.321318 kubelet[1863]: E0906 00:26:52.321264 1863 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55"} Sep 6 00:26:52.321369 kubelet[1863]: E0906 00:26:52.321347 1863 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e0e1d417-702a-4db0-a4e3-2c2c63621409\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:26:52.321458 kubelet[1863]: E0906 00:26:52.321381 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e0e1d417-702a-4db0-a4e3-2c2c63621409\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-chlxf" podUID="e0e1d417-702a-4db0-a4e3-2c2c63621409" Sep 6 00:26:52.907879 kubelet[1863]: E0906 00:26:52.907816 1863 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:52.934853 kubelet[1863]: E0906 00:26:52.934797 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:53.935409 kubelet[1863]: E0906 00:26:53.935371 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:54.936426 kubelet[1863]: E0906 00:26:54.936327 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:55.307855 kubelet[1863]: I0906 00:26:55.307685 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b6jmx\" (UniqueName: \"kubernetes.io/projected/f029bff3-1e82-4af3-9df3-5077a24ef493-kube-api-access-b6jmx\") pod \"nginx-deployment-7fcdb87857-txl88\" (UID: \"f029bff3-1e82-4af3-9df3-5077a24ef493\") " pod="default/nginx-deployment-7fcdb87857-txl88" Sep 6 00:26:55.311028 systemd[1]: Created slice kubepods-besteffort-podf029bff3_1e82_4af3_9df3_5077a24ef493.slice. Sep 6 00:26:55.614880 env[1416]: time="2025-09-06T00:26:55.614825240Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-txl88,Uid:f029bff3-1e82-4af3-9df3-5077a24ef493,Namespace:default,Attempt:0,}" Sep 6 00:26:55.733534 env[1416]: time="2025-09-06T00:26:55.733478085Z" level=error msg="Failed to destroy network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:55.736966 env[1416]: time="2025-09-06T00:26:55.736006377Z" level=error msg="encountered an error cleaning up failed sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:55.736966 env[1416]: time="2025-09-06T00:26:55.736076480Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-txl88,Uid:f029bff3-1e82-4af3-9df3-5077a24ef493,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:55.737124 kubelet[1863]: E0906 00:26:55.736306 1863 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:55.737124 kubelet[1863]: E0906 00:26:55.736372 1863 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-txl88" Sep 6 00:26:55.737124 kubelet[1863]: E0906 00:26:55.736399 1863 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-txl88" Sep 6 00:26:55.735724 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484-shm.mount: Deactivated successfully. Sep 6 00:26:55.737341 kubelet[1863]: E0906 00:26:55.736450 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-txl88_default(f029bff3-1e82-4af3-9df3-5077a24ef493)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-txl88_default(f029bff3-1e82-4af3-9df3-5077a24ef493)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-txl88" podUID="f029bff3-1e82-4af3-9df3-5077a24ef493" Sep 6 00:26:55.937714 kubelet[1863]: E0906 00:26:55.937031 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:56.301077 kubelet[1863]: I0906 00:26:56.300656 1863 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:26:56.301513 env[1416]: time="2025-09-06T00:26:56.301476288Z" level=info msg="StopPodSandbox for \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\"" Sep 6 00:26:56.326885 env[1416]: time="2025-09-06T00:26:56.326807591Z" level=error msg="StopPodSandbox for \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\" failed" error="failed to destroy network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:26:56.327182 kubelet[1863]: E0906 00:26:56.327137 1863 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:26:56.327290 kubelet[1863]: E0906 00:26:56.327185 1863 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484"} Sep 6 00:26:56.327290 kubelet[1863]: E0906 00:26:56.327226 1863 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f029bff3-1e82-4af3-9df3-5077a24ef493\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:26:56.327290 kubelet[1863]: E0906 00:26:56.327256 1863 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f029bff3-1e82-4af3-9df3-5077a24ef493\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-txl88" podUID="f029bff3-1e82-4af3-9df3-5077a24ef493" Sep 6 00:26:56.938205 kubelet[1863]: E0906 00:26:56.938101 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:57.938970 kubelet[1863]: E0906 00:26:57.938900 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:58.939076 kubelet[1863]: E0906 00:26:58.939009 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:26:59.939178 kubelet[1863]: E0906 00:26:59.939112 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:00.899813 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1625946960.mount: Deactivated successfully. Sep 6 00:27:00.940017 kubelet[1863]: E0906 00:27:00.939981 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:00.950038 env[1416]: time="2025-09-06T00:27:00.949989063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:00.962099 env[1416]: time="2025-09-06T00:27:00.962059949Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:00.966350 env[1416]: time="2025-09-06T00:27:00.966315986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:00.970811 env[1416]: time="2025-09-06T00:27:00.970776228Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:00.971255 env[1416]: time="2025-09-06T00:27:00.971222743Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 00:27:00.987384 env[1416]: time="2025-09-06T00:27:00.987344058Z" level=info msg="CreateContainer within sandbox \"7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 00:27:01.052420 env[1416]: time="2025-09-06T00:27:01.052366795Z" level=info msg="CreateContainer within sandbox \"7b8eaf546bba771e135d11f33cf1a1887cde2a839cb177466092117d31871a5a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"524fc92fdb52555532cca68fa70d8403cc86a935e29c3c1076e75de7613875fb\"" Sep 6 00:27:01.053123 env[1416]: time="2025-09-06T00:27:01.053091018Z" level=info msg="StartContainer for \"524fc92fdb52555532cca68fa70d8403cc86a935e29c3c1076e75de7613875fb\"" Sep 6 00:27:01.072662 systemd[1]: Started cri-containerd-524fc92fdb52555532cca68fa70d8403cc86a935e29c3c1076e75de7613875fb.scope. Sep 6 00:27:01.090000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.095860 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 00:27:01.095961 kernel: audit: type=1400 audit(1757118421.090:551): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.090000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdaeb633018 items=0 ppid=1955 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:01.126954 kernel: audit: type=1300 audit(1757118421.090:551): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdaeb633018 items=0 ppid=1955 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:01.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346663393266646235323535353533326363613638666137306438 Sep 6 00:27:01.144566 kernel: audit: type=1327 audit(1757118421.090:551): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346663393266646235323535353533326363613638666137306438 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.171935 kernel: audit: type=1400 audit(1757118421.094:552): avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.172029 kernel: audit: type=1400 audit(1757118421.094:552): avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.183983 kernel: audit: type=1400 audit(1757118421.094:552): avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.197202 kernel: audit: type=1400 audit(1757118421.094:552): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.209975 kernel: audit: type=1400 audit(1757118421.094:552): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.223870 kernel: audit: type=1400 audit(1757118421.094:552): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.224253 env[1416]: time="2025-09-06T00:27:01.224213548Z" level=info msg="StartContainer for \"524fc92fdb52555532cca68fa70d8403cc86a935e29c3c1076e75de7613875fb\" returns successfully" Sep 6 00:27:01.236567 kernel: audit: type=1400 audit(1757118421.094:552): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.094000 audit: BPF prog-id=79 op=LOAD Sep 6 00:27:01.094000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fb498 items=0 ppid=1955 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:01.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346663393266646235323535353533326363613638666137306438 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.108000 audit: BPF prog-id=80 op=LOAD Sep 6 00:27:01.108000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003be048 items=0 ppid=1955 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:01.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346663393266646235323535353533326363613638666137306438 Sep 6 00:27:01.144000 audit: BPF prog-id=80 op=UNLOAD Sep 6 00:27:01.144000 audit: BPF prog-id=79 op=UNLOAD Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:01.144000 audit: BPF prog-id=81 op=LOAD Sep 6 00:27:01.144000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003be0d8 items=0 ppid=1955 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:01.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346663393266646235323535353533326363613638666137306438 Sep 6 00:27:01.331857 kubelet[1863]: I0906 00:27:01.330613 1863 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-tsg2b" podStartSLOduration=6.433079071 podStartE2EDuration="28.330594962s" podCreationTimestamp="2025-09-06 00:26:33 +0000 UTC" firstStartedPulling="2025-09-06 00:26:39.074870989 +0000 UTC m=+6.888923095" lastFinishedPulling="2025-09-06 00:27:00.97238688 +0000 UTC m=+28.786438986" observedRunningTime="2025-09-06 00:27:01.32990614 +0000 UTC m=+29.143958246" watchObservedRunningTime="2025-09-06 00:27:01.330594962 +0000 UTC m=+29.144647068" Sep 6 00:27:01.477564 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 00:27:01.477737 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 00:27:01.940813 kubelet[1863]: E0906 00:27:01.940749 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:02.337310 systemd[1]: run-containerd-runc-k8s.io-524fc92fdb52555532cca68fa70d8403cc86a935e29c3c1076e75de7613875fb-runc.BTBfDB.mount: Deactivated successfully. Sep 6 00:27:02.742000 audit[2560]: AVC avc: denied { write } for pid=2560 comm="tee" name="fd" dev="proc" ino=23304 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:27:02.742000 audit[2560]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff105467d6 a2=241 a3=1b6 items=1 ppid=2537 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:02.742000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 00:27:02.742000 audit: PATH item=0 name="/dev/fd/63" inode=23295 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:02.742000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:27:02.745000 audit[2562]: AVC avc: denied { write } for pid=2562 comm="tee" name="fd" dev="proc" ino=22487 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:27:02.748000 audit[2568]: AVC avc: denied { write } for pid=2568 comm="tee" name="fd" dev="proc" ino=23315 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:27:02.750000 audit[2564]: AVC avc: denied { write } for pid=2564 comm="tee" name="fd" dev="proc" ino=23318 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:27:02.750000 audit[2564]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3f8ee7d4 a2=241 a3=1b6 items=1 ppid=2535 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:02.750000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 00:27:02.745000 audit[2562]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe946857c5 a2=241 a3=1b6 items=1 ppid=2538 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:02.745000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 00:27:02.748000 audit[2568]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6732e7d4 a2=241 a3=1b6 items=1 ppid=2530 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:02.748000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 00:27:02.748000 audit: PATH item=0 name="/dev/fd/63" inode=23301 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:02.748000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:27:02.750000 audit: PATH item=0 name="/dev/fd/63" inode=22481 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:02.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:27:02.745000 audit: PATH item=0 name="/dev/fd/63" inode=23298 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:02.745000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:27:02.757000 audit[2566]: AVC avc: denied { write } for pid=2566 comm="tee" name="fd" dev="proc" ino=22495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:27:02.758000 audit[2577]: AVC avc: denied { write } for pid=2577 comm="tee" name="fd" dev="proc" ino=23324 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:27:02.758000 audit[2577]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7d14f7d4 a2=241 a3=1b6 items=1 ppid=2543 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:02.758000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 00:27:02.758000 audit: PATH item=0 name="/dev/fd/63" inode=23312 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:02.758000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:27:02.757000 audit[2566]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffde2647d5 a2=241 a3=1b6 items=1 ppid=2529 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:02.757000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 00:27:02.757000 audit: PATH item=0 name="/dev/fd/63" inode=22484 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:02.757000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:27:02.769000 audit[2596]: AVC avc: denied { write } for pid=2596 comm="tee" name="fd" dev="proc" ino=22500 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:27:02.769000 audit[2596]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1ee0d7c4 a2=241 a3=1b6 items=1 ppid=2548 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:02.769000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 00:27:02.769000 audit: PATH item=0 name="/dev/fd/63" inode=22492 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:02.769000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:27:02.941709 kubelet[1863]: E0906 00:27:02.941639 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.026000 audit: BPF prog-id=82 op=LOAD Sep 6 00:27:03.026000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1e655ca0 a2=98 a3=1fffffffffffffff items=0 ppid=2545 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.026000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:27:03.029000 audit: BPF prog-id=82 op=UNLOAD Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit: BPF prog-id=83 op=LOAD Sep 6 00:27:03.029000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1e655b80 a2=94 a3=3 items=0 ppid=2545 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.029000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:27:03.029000 audit: BPF prog-id=83 op=UNLOAD Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit: BPF prog-id=84 op=LOAD Sep 6 00:27:03.029000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1e655bc0 a2=94 a3=7ffe1e655da0 items=0 ppid=2545 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.029000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:27:03.029000 audit: BPF prog-id=84 op=UNLOAD Sep 6 00:27:03.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.029000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe1e655c90 a2=50 a3=a000000085 items=0 ppid=2545 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.029000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.030000 audit: BPF prog-id=85 op=LOAD Sep 6 00:27:03.030000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb6d6a7c0 a2=98 a3=3 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.031000 audit: BPF prog-id=85 op=UNLOAD Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit: BPF prog-id=86 op=LOAD Sep 6 00:27:03.031000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb6d6a5b0 a2=94 a3=54428f items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.031000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.031000 audit: BPF prog-id=86 op=UNLOAD Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.031000 audit: BPF prog-id=87 op=LOAD Sep 6 00:27:03.031000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb6d6a5e0 a2=94 a3=2 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.031000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.031000 audit: BPF prog-id=87 op=UNLOAD Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit: BPF prog-id=88 op=LOAD Sep 6 00:27:03.150000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb6d6a4a0 a2=94 a3=1 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.150000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.150000 audit: BPF prog-id=88 op=UNLOAD Sep 6 00:27:03.150000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.150000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdb6d6a570 a2=50 a3=7ffdb6d6a650 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.150000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb6d6a4b0 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6d6a4e0 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6d6a3f0 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb6d6a500 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb6d6a4e0 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb6d6a4d0 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb6d6a500 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6d6a4e0 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6d6a500 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6d6a4d0 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.160000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.160000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb6d6a540 a2=28 a3=0 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.160000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb6d6a2f0 a2=50 a3=1 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit: BPF prog-id=89 op=LOAD Sep 6 00:27:03.161000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb6d6a2f0 a2=94 a3=5 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.161000 audit: BPF prog-id=89 op=UNLOAD Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb6d6a3a0 a2=50 a3=1 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdb6d6a4c0 a2=4 a3=38 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { confidentiality } for pid=2638 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:03.161000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb6d6a510 a2=94 a3=6 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { confidentiality } for pid=2638 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:03.161000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb6d69cc0 a2=94 a3=88 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.161000 audit[2638]: AVC avc: denied { confidentiality } for pid=2638 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:03.161000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb6d69cc0 a2=94 a3=88 items=0 ppid=2545 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.161000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit: BPF prog-id=90 op=LOAD Sep 6 00:27:03.170000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff24a05700 a2=98 a3=1999999999999999 items=0 ppid=2545 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.170000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:27:03.170000 audit: BPF prog-id=90 op=UNLOAD Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit: BPF prog-id=91 op=LOAD Sep 6 00:27:03.170000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff24a055e0 a2=94 a3=ffff items=0 ppid=2545 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.170000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:27:03.170000 audit: BPF prog-id=91 op=UNLOAD Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.170000 audit: BPF prog-id=92 op=LOAD Sep 6 00:27:03.170000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff24a05620 a2=94 a3=7fff24a05800 items=0 ppid=2545 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.170000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:27:03.170000 audit: BPF prog-id=92 op=UNLOAD Sep 6 00:27:03.285392 systemd-networkd[1558]: vxlan.calico: Link UP Sep 6 00:27:03.285401 systemd-networkd[1558]: vxlan.calico: Gained carrier Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit: BPF prog-id=93 op=LOAD Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0ecfb0c0 a2=98 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit: BPF prog-id=93 op=UNLOAD Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit: BPF prog-id=94 op=LOAD Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0ecfaed0 a2=94 a3=54428f items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit: BPF prog-id=94 op=UNLOAD Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit: BPF prog-id=95 op=LOAD Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0ecfaf00 a2=94 a3=2 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit: BPF prog-id=95 op=UNLOAD Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc0ecfadd0 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0ecfae00 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0ecfad10 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc0ecfae20 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc0ecfae00 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.342000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.342000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc0ecfadf0 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc0ecfae20 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0ecfae00 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0ecfae20 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0ecfadf0 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc0ecfae60 a2=28 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.343000 audit: BPF prog-id=96 op=LOAD Sep 6 00:27:03.343000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc0ecfacd0 a2=94 a3=0 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.343000 audit: BPF prog-id=96 op=UNLOAD Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc0ecfacc0 a2=50 a3=2800 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc0ecfacc0 a2=50 a3=2800 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit: BPF prog-id=97 op=LOAD Sep 6 00:27:03.344000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc0ecfa4e0 a2=94 a3=2 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.344000 audit: BPF prog-id=97 op=UNLOAD Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.344000 audit: BPF prog-id=98 op=LOAD Sep 6 00:27:03.344000 audit[2667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc0ecfa5e0 a2=94 a3=30 items=0 ppid=2545 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.353000 audit: BPF prog-id=99 op=LOAD Sep 6 00:27:03.353000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8ea0c250 a2=98 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.353000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.353000 audit: BPF prog-id=99 op=UNLOAD Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit: BPF prog-id=100 op=LOAD Sep 6 00:27:03.354000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8ea0c040 a2=94 a3=54428f items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.354000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.354000 audit: BPF prog-id=100 op=UNLOAD Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.354000 audit: BPF prog-id=101 op=LOAD Sep 6 00:27:03.354000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8ea0c070 a2=94 a3=2 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.354000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.354000 audit: BPF prog-id=101 op=UNLOAD Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.482000 audit: BPF prog-id=102 op=LOAD Sep 6 00:27:03.482000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8ea0bf30 a2=94 a3=1 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.482000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.483000 audit: BPF prog-id=102 op=UNLOAD Sep 6 00:27:03.483000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.483000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd8ea0c000 a2=50 a3=7ffd8ea0c0e0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.483000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8ea0bf40 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8ea0bf70 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8ea0be80 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8ea0bf90 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8ea0bf70 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8ea0bf60 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8ea0bf90 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8ea0bf70 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8ea0bf90 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8ea0bf60 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8ea0bfd0 a2=28 a3=0 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8ea0bd80 a2=50 a3=1 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit: BPF prog-id=103 op=LOAD Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd8ea0bd80 a2=94 a3=5 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.493000 audit: BPF prog-id=103 op=UNLOAD Sep 6 00:27:03.493000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.493000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8ea0be30 a2=50 a3=1 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd8ea0bf50 a2=4 a3=38 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.494000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { confidentiality } for pid=2671 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:03.494000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8ea0bfa0 a2=94 a3=6 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.494000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { confidentiality } for pid=2671 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:03.494000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8ea0b750 a2=94 a3=88 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.494000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.494000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8ea0b750 a2=94 a3=88 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.494000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.495000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.495000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8ea0d180 a2=10 a3=f8f00800 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.495000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.495000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.495000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8ea0d020 a2=10 a3=3 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.495000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.495000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.495000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8ea0cfc0 a2=10 a3=3 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.495000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.495000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:03.495000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8ea0cfc0 a2=10 a3=7 items=0 ppid=2545 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.495000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:27:03.503000 audit: BPF prog-id=98 op=UNLOAD Sep 6 00:27:03.637000 audit[2695]: NETFILTER_CFG table=mangle:70 family=2 entries=16 op=nft_register_chain pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:03.637000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffeefc23410 a2=0 a3=7ffeefc233fc items=0 ppid=2545 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.637000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:03.649000 audit[2696]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:03.649000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc9b859fc0 a2=0 a3=7ffc9b859fac items=0 ppid=2545 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.649000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:03.654000 audit[2697]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:03.654000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffcecb41c0 a2=0 a3=7fffcecb41ac items=0 ppid=2545 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.654000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:03.669000 audit[2698]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:03.669000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc20176410 a2=0 a3=7ffc201763fc items=0 ppid=2545 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:03.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:03.942633 kubelet[1863]: E0906 00:27:03.942479 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:04.943178 kubelet[1863]: E0906 00:27:04.943122 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:05.097069 systemd-networkd[1558]: vxlan.calico: Gained IPv6LL Sep 6 00:27:05.944362 kubelet[1863]: E0906 00:27:05.944260 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:06.945063 kubelet[1863]: E0906 00:27:06.945001 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:07.945500 kubelet[1863]: E0906 00:27:07.945431 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:08.241221 env[1416]: time="2025-09-06T00:27:08.241080569Z" level=info msg="StopPodSandbox for \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\"" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.283 [INFO][2717] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.283 [INFO][2717] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" iface="eth0" netns="/var/run/netns/cni-ee897899-ffe9-f3ab-0aae-6aad8ba8474d" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.284 [INFO][2717] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" iface="eth0" netns="/var/run/netns/cni-ee897899-ffe9-f3ab-0aae-6aad8ba8474d" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.284 [INFO][2717] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" iface="eth0" netns="/var/run/netns/cni-ee897899-ffe9-f3ab-0aae-6aad8ba8474d" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.284 [INFO][2717] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.284 [INFO][2717] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.305 [INFO][2724] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.306 [INFO][2724] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.306 [INFO][2724] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.312 [WARNING][2724] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.312 [INFO][2724] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.313 [INFO][2724] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:08.316950 env[1416]: 2025-09-06 00:27:08.315 [INFO][2717] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:08.321658 env[1416]: time="2025-09-06T00:27:08.317114042Z" level=info msg="TearDown network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\" successfully" Sep 6 00:27:08.321658 env[1416]: time="2025-09-06T00:27:08.317163743Z" level=info msg="StopPodSandbox for \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\" returns successfully" Sep 6 00:27:08.321658 env[1416]: time="2025-09-06T00:27:08.318038666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-chlxf,Uid:e0e1d417-702a-4db0-a4e3-2c2c63621409,Namespace:calico-system,Attempt:1,}" Sep 6 00:27:08.319552 systemd[1]: run-netns-cni\x2dee897899\x2dffe9\x2df3ab\x2d0aae\x2d6aad8ba8474d.mount: Deactivated successfully. Sep 6 00:27:08.464531 systemd-networkd[1558]: calib6ecd73bdd5: Link UP Sep 6 00:27:08.471894 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:27:08.478967 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib6ecd73bdd5: link becomes ready Sep 6 00:27:08.480554 systemd-networkd[1558]: calib6ecd73bdd5: Gained carrier Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.400 [INFO][2730] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-csi--node--driver--chlxf-eth0 csi-node-driver- calico-system e0e1d417-702a-4db0-a4e3-2c2c63621409 1421 0 2025-09-06 00:26:33 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.12 csi-node-driver-chlxf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib6ecd73bdd5 [] [] }} ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.400 [INFO][2730] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.424 [INFO][2744] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" HandleID="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.424 [INFO][2744] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" HandleID="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c5040), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.12", "pod":"csi-node-driver-chlxf", "timestamp":"2025-09-06 00:27:08.424167821 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.424 [INFO][2744] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.424 [INFO][2744] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.424 [INFO][2744] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12' Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.432 [INFO][2744] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.437 [INFO][2744] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.441 [INFO][2744] ipam/ipam.go 511: Trying affinity for 192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.442 [INFO][2744] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.444 [INFO][2744] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.444 [INFO][2744] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.445 [INFO][2744] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5 Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.450 [INFO][2744] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.455 [INFO][2744] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.193/26] block=192.168.25.192/26 handle="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.455 [INFO][2744] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.193/26] handle="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" host="10.200.8.12" Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.455 [INFO][2744] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:08.494302 env[1416]: 2025-09-06 00:27:08.455 [INFO][2744] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.193/26] IPv6=[] ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" HandleID="k8s-pod-network.0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.495240 env[1416]: 2025-09-06 00:27:08.457 [INFO][2730] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--chlxf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0e1d417-702a-4db0-a4e3-2c2c63621409", ResourceVersion:"1421", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"csi-node-driver-chlxf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib6ecd73bdd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:08.495240 env[1416]: 2025-09-06 00:27:08.457 [INFO][2730] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.193/32] ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.495240 env[1416]: 2025-09-06 00:27:08.457 [INFO][2730] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib6ecd73bdd5 ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.495240 env[1416]: 2025-09-06 00:27:08.480 [INFO][2730] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.495240 env[1416]: 2025-09-06 00:27:08.480 [INFO][2730] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--chlxf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0e1d417-702a-4db0-a4e3-2c2c63621409", ResourceVersion:"1421", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5", Pod:"csi-node-driver-chlxf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib6ecd73bdd5", MAC:"f2:3d:42:8a:4b:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:08.495240 env[1416]: 2025-09-06 00:27:08.491 [INFO][2730] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5" Namespace="calico-system" Pod="csi-node-driver-chlxf" WorkloadEndpoint="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:08.512526 env[1416]: time="2025-09-06T00:27:08.512459512Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:27:08.512733 env[1416]: time="2025-09-06T00:27:08.512496413Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:27:08.512733 env[1416]: time="2025-09-06T00:27:08.512509814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:27:08.512733 env[1416]: time="2025-09-06T00:27:08.512646817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5 pid=2769 runtime=io.containerd.runc.v2 Sep 6 00:27:08.546215 systemd[1]: Started cri-containerd-0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5.scope. Sep 6 00:27:08.584515 kernel: kauditd_printk_skb: 596 callbacks suppressed Sep 6 00:27:08.584700 kernel: audit: type=1400 audit(1757118428.562:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.606998 kernel: audit: type=1400 audit(1757118428.562:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.627450 env[1416]: time="2025-09-06T00:27:08.627412596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-chlxf,Uid:e0e1d417-702a-4db0-a4e3-2c2c63621409,Namespace:calico-system,Attempt:1,} returns sandbox id \"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5\"" Sep 6 00:27:08.629245 env[1416]: time="2025-09-06T00:27:08.629218843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 00:27:08.638207 kernel: audit: type=1400 audit(1757118428.562:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.638316 kernel: audit: type=1400 audit(1757118428.562:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.651789 kernel: audit: type=1400 audit(1757118428.562:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.666872 kernel: audit: type=1400 audit(1757118428.562:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.691799 kernel: audit: type=1400 audit(1757118428.562:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.691915 kernel: audit: type=1400 audit(1757118428.562:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.693445 kernel: audit: type=1400 audit(1757118428.562:674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.703917 kernel: audit: type=1400 audit(1757118428.562:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.562000 audit: BPF prog-id=104 op=LOAD Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2769 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:08.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653864316332336137623034656434343363623130356362353361 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2769 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:08.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653864316332336137623034656434343363623130356362353361 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.564000 audit: BPF prog-id=105 op=LOAD Sep 6 00:27:08.564000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001be110 items=0 ppid=2769 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:08.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653864316332336137623034656434343363623130356362353361 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.567000 audit: BPF prog-id=106 op=LOAD Sep 6 00:27:08.567000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001be158 items=0 ppid=2769 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:08.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653864316332336137623034656434343363623130356362353361 Sep 6 00:27:08.583000 audit: BPF prog-id=106 op=UNLOAD Sep 6 00:27:08.583000 audit: BPF prog-id=105 op=UNLOAD Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:08.583000 audit: BPF prog-id=107 op=LOAD Sep 6 00:27:08.583000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001be568 items=0 ppid=2769 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:08.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653864316332336137623034656434343363623130356362353361 Sep 6 00:27:08.528000 audit[2760]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:08.528000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffdf65f6820 a2=0 a3=7ffdf65f680c items=0 ppid=2545 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:08.528000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:08.946581 kubelet[1863]: E0906 00:27:08.946531 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:09.242333 env[1416]: time="2025-09-06T00:27:09.242082293Z" level=info msg="StopPodSandbox for \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\"" Sep 6 00:27:09.318965 systemd[1]: run-containerd-runc-k8s.io-0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5-runc.FdDDsI.mount: Deactivated successfully. Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.288 [INFO][2823] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.288 [INFO][2823] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" iface="eth0" netns="/var/run/netns/cni-e2b5f93f-037f-1605-3a29-8bd99416dc3e" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.288 [INFO][2823] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" iface="eth0" netns="/var/run/netns/cni-e2b5f93f-037f-1605-3a29-8bd99416dc3e" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.289 [INFO][2823] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" iface="eth0" netns="/var/run/netns/cni-e2b5f93f-037f-1605-3a29-8bd99416dc3e" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.289 [INFO][2823] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.289 [INFO][2823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.308 [INFO][2831] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.309 [INFO][2831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.309 [INFO][2831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.316 [WARNING][2831] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.316 [INFO][2831] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.321 [INFO][2831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:09.323567 env[1416]: 2025-09-06 00:27:09.322 [INFO][2823] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:09.325958 systemd[1]: run-netns-cni\x2de2b5f93f\x2d037f\x2d1605\x2d3a29\x2d8bd99416dc3e.mount: Deactivated successfully. Sep 6 00:27:09.327493 env[1416]: time="2025-09-06T00:27:09.327309549Z" level=info msg="TearDown network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\" successfully" Sep 6 00:27:09.327493 env[1416]: time="2025-09-06T00:27:09.327349650Z" level=info msg="StopPodSandbox for \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\" returns successfully" Sep 6 00:27:09.328513 env[1416]: time="2025-09-06T00:27:09.328170971Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-txl88,Uid:f029bff3-1e82-4af3-9df3-5077a24ef493,Namespace:default,Attempt:1,}" Sep 6 00:27:09.480630 systemd-networkd[1558]: calibb8a10f33c6: Link UP Sep 6 00:27:09.491078 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:27:09.491208 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibb8a10f33c6: link becomes ready Sep 6 00:27:09.494685 systemd-networkd[1558]: calibb8a10f33c6: Gained carrier Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.412 [INFO][2837] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0 nginx-deployment-7fcdb87857- default f029bff3-1e82-4af3-9df3-5077a24ef493 1429 0 2025-09-06 00:26:55 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.12 nginx-deployment-7fcdb87857-txl88 eth0 default [] [] [kns.default ksa.default.default] calibb8a10f33c6 [] [] }} ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.413 [INFO][2837] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.439 [INFO][2852] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" HandleID="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.439 [INFO][2852] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" HandleID="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.12", "pod":"nginx-deployment-7fcdb87857-txl88", "timestamp":"2025-09-06 00:27:09.439725894 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.440 [INFO][2852] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.440 [INFO][2852] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.440 [INFO][2852] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12' Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.447 [INFO][2852] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.453 [INFO][2852] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.456 [INFO][2852] ipam/ipam.go 511: Trying affinity for 192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.458 [INFO][2852] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.460 [INFO][2852] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.460 [INFO][2852] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.462 [INFO][2852] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310 Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.469 [INFO][2852] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.475 [INFO][2852] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.194/26] block=192.168.25.192/26 handle="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.475 [INFO][2852] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.194/26] handle="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" host="10.200.8.12" Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.475 [INFO][2852] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:09.509632 env[1416]: 2025-09-06 00:27:09.475 [INFO][2852] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.194/26] IPv6=[] ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" HandleID="k8s-pod-network.b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.510610 env[1416]: 2025-09-06 00:27:09.477 [INFO][2837] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"f029bff3-1e82-4af3-9df3-5077a24ef493", ResourceVersion:"1429", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-txl88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibb8a10f33c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:09.510610 env[1416]: 2025-09-06 00:27:09.477 [INFO][2837] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.194/32] ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.510610 env[1416]: 2025-09-06 00:27:09.477 [INFO][2837] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibb8a10f33c6 ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.510610 env[1416]: 2025-09-06 00:27:09.496 [INFO][2837] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.510610 env[1416]: 2025-09-06 00:27:09.496 [INFO][2837] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"f029bff3-1e82-4af3-9df3-5077a24ef493", ResourceVersion:"1429", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310", Pod:"nginx-deployment-7fcdb87857-txl88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibb8a10f33c6", MAC:"86:d3:fe:df:34:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:09.510610 env[1416]: 2025-09-06 00:27:09.508 [INFO][2837] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310" Namespace="default" Pod="nginx-deployment-7fcdb87857-txl88" WorkloadEndpoint="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:09.537528 env[1416]: time="2025-09-06T00:27:09.537439966Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:27:09.537802 env[1416]: time="2025-09-06T00:27:09.537752474Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:27:09.537961 env[1416]: time="2025-09-06T00:27:09.537933179Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:27:09.538316 env[1416]: time="2025-09-06T00:27:09.538269287Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310 pid=2874 runtime=io.containerd.runc.v2 Sep 6 00:27:09.539000 audit[2879]: NETFILTER_CFG table=filter:75 family=2 entries=42 op=nft_register_chain pid=2879 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:09.539000 audit[2879]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fff761c3b60 a2=0 a3=7fff761c3b4c items=0 ppid=2545 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:09.539000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:09.562638 systemd[1]: Started cri-containerd-b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310.scope. Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.574000 audit: BPF prog-id=108 op=LOAD Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343330366537393563653839313630336433393466666632643634 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343330366537393563653839313630336433393466666632643634 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit: BPF prog-id=109 op=LOAD Sep 6 00:27:09.575000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a11d0 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343330366537393563653839313630336433393466666632643634 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit: BPF prog-id=110 op=LOAD Sep 6 00:27:09.575000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a1218 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343330366537393563653839313630336433393466666632643634 Sep 6 00:27:09.575000 audit: BPF prog-id=110 op=UNLOAD Sep 6 00:27:09.575000 audit: BPF prog-id=109 op=UNLOAD Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:09.575000 audit: BPF prog-id=111 op=LOAD Sep 6 00:27:09.575000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a1628 items=0 ppid=2874 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343330366537393563653839313630336433393466666632643634 Sep 6 00:27:09.606053 env[1416]: time="2025-09-06T00:27:09.606010301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-txl88,Uid:f029bff3-1e82-4af3-9df3-5077a24ef493,Namespace:default,Attempt:1,} returns sandbox id \"b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310\"" Sep 6 00:27:09.946781 kubelet[1863]: E0906 00:27:09.946722 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:10.217210 systemd-networkd[1558]: calib6ecd73bdd5: Gained IPv6LL Sep 6 00:27:10.220740 env[1416]: time="2025-09-06T00:27:10.220697616Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:10.228036 env[1416]: time="2025-09-06T00:27:10.227995196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:10.232231 env[1416]: time="2025-09-06T00:27:10.232190699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:10.238236 env[1416]: time="2025-09-06T00:27:10.238197548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:10.238653 env[1416]: time="2025-09-06T00:27:10.238616658Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 00:27:10.240522 env[1416]: time="2025-09-06T00:27:10.240494804Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:27:10.241193 env[1416]: time="2025-09-06T00:27:10.241159521Z" level=info msg="CreateContainer within sandbox \"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 00:27:10.291515 env[1416]: time="2025-09-06T00:27:10.291456562Z" level=info msg="CreateContainer within sandbox \"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"49a50913a3cc364bbcda3652a044692edac50d4f39b7faf673db1e5353f7923c\"" Sep 6 00:27:10.292328 env[1416]: time="2025-09-06T00:27:10.292290582Z" level=info msg="StartContainer for \"49a50913a3cc364bbcda3652a044692edac50d4f39b7faf673db1e5353f7923c\"" Sep 6 00:27:10.309620 systemd[1]: Started cri-containerd-49a50913a3cc364bbcda3652a044692edac50d4f39b7faf673db1e5353f7923c.scope. Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f74b0624b18 items=0 ppid=2769 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:10.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613530393133613363633336346262636461333635326130343436 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit: BPF prog-id=112 op=LOAD Sep 6 00:27:10.329000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00028b588 items=0 ppid=2769 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:10.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613530393133613363633336346262636461333635326130343436 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit: BPF prog-id=113 op=LOAD Sep 6 00:27:10.329000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00028b5d8 items=0 ppid=2769 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:10.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613530393133613363633336346262636461333635326130343436 Sep 6 00:27:10.329000 audit: BPF prog-id=113 op=UNLOAD Sep 6 00:27:10.329000 audit: BPF prog-id=112 op=UNLOAD Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:10.329000 audit: BPF prog-id=114 op=LOAD Sep 6 00:27:10.329000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00028b668 items=0 ppid=2769 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:10.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613530393133613363633336346262636461333635326130343436 Sep 6 00:27:10.352424 env[1416]: time="2025-09-06T00:27:10.352381865Z" level=info msg="StartContainer for \"49a50913a3cc364bbcda3652a044692edac50d4f39b7faf673db1e5353f7923c\" returns successfully" Sep 6 00:27:10.857286 systemd-networkd[1558]: calibb8a10f33c6: Gained IPv6LL Sep 6 00:27:10.947482 kubelet[1863]: E0906 00:27:10.947434 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:11.948296 kubelet[1863]: E0906 00:27:11.948234 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:12.908174 kubelet[1863]: E0906 00:27:12.908107 1863 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:12.949123 kubelet[1863]: E0906 00:27:12.949060 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:13.271400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3618950964.mount: Deactivated successfully. Sep 6 00:27:13.949425 kubelet[1863]: E0906 00:27:13.949380 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:14.870068 env[1416]: time="2025-09-06T00:27:14.870010191Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:14.877631 env[1416]: time="2025-09-06T00:27:14.877580860Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:14.882175 env[1416]: time="2025-09-06T00:27:14.882137562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:14.886309 env[1416]: time="2025-09-06T00:27:14.886271955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:14.887067 env[1416]: time="2025-09-06T00:27:14.887037372Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:27:14.889291 env[1416]: time="2025-09-06T00:27:14.888727209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 00:27:14.890165 env[1416]: time="2025-09-06T00:27:14.890134741Z" level=info msg="CreateContainer within sandbox \"b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 6 00:27:14.929656 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1365038637.mount: Deactivated successfully. Sep 6 00:27:14.938487 env[1416]: time="2025-09-06T00:27:14.938443320Z" level=info msg="CreateContainer within sandbox \"b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3bf62b6f9ec12c141ffcfe5f099c16678d59862a6311d96d447ccdc20913f0de\"" Sep 6 00:27:14.939178 env[1416]: time="2025-09-06T00:27:14.939144735Z" level=info msg="StartContainer for \"3bf62b6f9ec12c141ffcfe5f099c16678d59862a6311d96d447ccdc20913f0de\"" Sep 6 00:27:14.950003 kubelet[1863]: E0906 00:27:14.949958 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:14.968712 systemd[1]: Started cri-containerd-3bf62b6f9ec12c141ffcfe5f099c16678d59862a6311d96d447ccdc20913f0de.scope. Sep 6 00:27:14.996245 kernel: kauditd_printk_skb: 153 callbacks suppressed Sep 6 00:27:14.996366 kernel: audit: type=1400 audit(1757118434.979:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.008849 kernel: audit: type=1400 audit(1757118434.979:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.008938 kernel: audit: type=1400 audit(1757118434.979:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.033874 kernel: audit: type=1400 audit(1757118434.979:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.057623 kernel: audit: type=1400 audit(1757118434.979:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.057718 kernel: audit: type=1400 audit(1757118434.979:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.070890 kernel: audit: type=1400 audit(1757118434.979:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.073564 kernel: audit: type=1400 audit(1757118434.979:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.075005 env[1416]: time="2025-09-06T00:27:15.074962929Z" level=info msg="StartContainer for \"3bf62b6f9ec12c141ffcfe5f099c16678d59862a6311d96d447ccdc20913f0de\" returns successfully" Sep 6 00:27:14.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.107861 kernel: audit: type=1400 audit(1757118434.979:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:15.107944 kernel: audit: type=1400 audit(1757118434.984:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit: BPF prog-id=115 op=LOAD Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2874 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:14.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663632623666396563313263313431666663666535663039396331 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2874 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:14.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663632623666396563313263313431666663666535663039396331 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.984000 audit: BPF prog-id=116 op=LOAD Sep 6 00:27:14.984000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000380820 items=0 ppid=2874 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:14.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663632623666396563313263313431666663666535663039396331 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit: BPF prog-id=117 op=LOAD Sep 6 00:27:14.995000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000380868 items=0 ppid=2874 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:14.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663632623666396563313263313431666663666535663039396331 Sep 6 00:27:14.995000 audit: BPF prog-id=117 op=UNLOAD Sep 6 00:27:14.995000 audit: BPF prog-id=116 op=UNLOAD Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:14.995000 audit: BPF prog-id=118 op=LOAD Sep 6 00:27:14.995000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000380c78 items=0 ppid=2874 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:14.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663632623666396563313263313431666663666535663039396331 Sep 6 00:27:15.367991 kubelet[1863]: I0906 00:27:15.367940 1863 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-txl88" podStartSLOduration=15.086317634 podStartE2EDuration="20.367923914s" podCreationTimestamp="2025-09-06 00:26:55 +0000 UTC" firstStartedPulling="2025-09-06 00:27:09.606941325 +0000 UTC m=+37.420993431" lastFinishedPulling="2025-09-06 00:27:14.888547505 +0000 UTC m=+42.702599711" observedRunningTime="2025-09-06 00:27:15.367897514 +0000 UTC m=+43.181949620" watchObservedRunningTime="2025-09-06 00:27:15.367923914 +0000 UTC m=+43.181976020" Sep 6 00:27:15.924513 systemd[1]: run-containerd-runc-k8s.io-3bf62b6f9ec12c141ffcfe5f099c16678d59862a6311d96d447ccdc20913f0de-runc.eyKb8y.mount: Deactivated successfully. Sep 6 00:27:15.950382 kubelet[1863]: E0906 00:27:15.950344 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:16.579797 env[1416]: time="2025-09-06T00:27:16.579743624Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:16.585809 env[1416]: time="2025-09-06T00:27:16.585765453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:16.590333 env[1416]: time="2025-09-06T00:27:16.590293649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:16.594754 env[1416]: time="2025-09-06T00:27:16.594722143Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:16.595179 env[1416]: time="2025-09-06T00:27:16.595145952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 00:27:16.597565 env[1416]: time="2025-09-06T00:27:16.597535603Z" level=info msg="CreateContainer within sandbox \"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 00:27:16.644216 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2798947941.mount: Deactivated successfully. Sep 6 00:27:16.662418 env[1416]: time="2025-09-06T00:27:16.662372782Z" level=info msg="CreateContainer within sandbox \"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ec9733c3847c08bbf0643c07a5efce82f8c7221a77fbc223d2a9ab70f9616474\"" Sep 6 00:27:16.663138 env[1416]: time="2025-09-06T00:27:16.663085197Z" level=info msg="StartContainer for \"ec9733c3847c08bbf0643c07a5efce82f8c7221a77fbc223d2a9ab70f9616474\"" Sep 6 00:27:16.687207 systemd[1]: Started cri-containerd-ec9733c3847c08bbf0643c07a5efce82f8c7221a77fbc223d2a9ab70f9616474.scope. Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f745803eba8 items=0 ppid=2769 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:16.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393733336333383437633038626266303634336330376135656663 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.703000 audit: BPF prog-id=119 op=LOAD Sep 6 00:27:16.703000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003909c8 items=0 ppid=2769 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:16.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393733336333383437633038626266303634336330376135656663 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit: BPF prog-id=120 op=LOAD Sep 6 00:27:16.704000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000390a18 items=0 ppid=2769 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:16.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393733336333383437633038626266303634336330376135656663 Sep 6 00:27:16.704000 audit: BPF prog-id=120 op=UNLOAD Sep 6 00:27:16.704000 audit: BPF prog-id=119 op=UNLOAD Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:16.704000 audit: BPF prog-id=121 op=LOAD Sep 6 00:27:16.704000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000390aa8 items=0 ppid=2769 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:16.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393733336333383437633038626266303634336330376135656663 Sep 6 00:27:16.725775 env[1416]: time="2025-09-06T00:27:16.725724130Z" level=info msg="StartContainer for \"ec9733c3847c08bbf0643c07a5efce82f8c7221a77fbc223d2a9ab70f9616474\" returns successfully" Sep 6 00:27:16.950938 kubelet[1863]: E0906 00:27:16.950876 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:17.293918 kubelet[1863]: I0906 00:27:17.293797 1863 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 00:27:17.293918 kubelet[1863]: I0906 00:27:17.293869 1863 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 00:27:17.374707 kubelet[1863]: I0906 00:27:17.374650 1863 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-chlxf" podStartSLOduration=36.407241202 podStartE2EDuration="44.374634345s" podCreationTimestamp="2025-09-06 00:26:33 +0000 UTC" firstStartedPulling="2025-09-06 00:27:08.62871423 +0000 UTC m=+36.442766436" lastFinishedPulling="2025-09-06 00:27:16.596107473 +0000 UTC m=+44.410159579" observedRunningTime="2025-09-06 00:27:17.374548143 +0000 UTC m=+45.188600249" watchObservedRunningTime="2025-09-06 00:27:17.374634345 +0000 UTC m=+45.188686451" Sep 6 00:27:17.951351 kubelet[1863]: E0906 00:27:17.951277 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:18.555417 systemd[1]: Created slice kubepods-besteffort-pod09c88490_4bbe_490d_93dd_e9a56555f8cc.slice. Sep 6 00:27:18.562000 audit[3044]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:27:18.562000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd77c84ec0 a2=0 a3=7ffd77c84eac items=0 ppid=2116 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:18.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:27:18.566000 audit[3044]: NETFILTER_CFG table=nat:77 family=2 entries=26 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:27:18.566000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffd77c84ec0 a2=0 a3=0 items=0 ppid=2116 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:18.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:27:18.583000 audit[3048]: NETFILTER_CFG table=filter:78 family=2 entries=32 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:27:18.583000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd7513e440 a2=0 a3=7ffd7513e42c items=0 ppid=2116 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:18.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:27:18.587000 audit[3048]: NETFILTER_CFG table=nat:79 family=2 entries=26 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:27:18.587000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffd7513e440 a2=0 a3=0 items=0 ppid=2116 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:18.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:27:18.639233 kubelet[1863]: I0906 00:27:18.639165 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/09c88490-4bbe-490d-93dd-e9a56555f8cc-data\") pod \"nfs-server-provisioner-0\" (UID: \"09c88490-4bbe-490d-93dd-e9a56555f8cc\") " pod="default/nfs-server-provisioner-0" Sep 6 00:27:18.639415 kubelet[1863]: I0906 00:27:18.639242 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-csdl2\" (UniqueName: \"kubernetes.io/projected/09c88490-4bbe-490d-93dd-e9a56555f8cc-kube-api-access-csdl2\") pod \"nfs-server-provisioner-0\" (UID: \"09c88490-4bbe-490d-93dd-e9a56555f8cc\") " pod="default/nfs-server-provisioner-0" Sep 6 00:27:18.859500 env[1416]: time="2025-09-06T00:27:18.859438460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:09c88490-4bbe-490d-93dd-e9a56555f8cc,Namespace:default,Attempt:0,}" Sep 6 00:27:18.952360 kubelet[1863]: E0906 00:27:18.952315 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:19.019450 systemd-networkd[1558]: cali60e51b789ff: Link UP Sep 6 00:27:19.032594 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:27:19.032635 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 6 00:27:19.034653 systemd-networkd[1558]: cali60e51b789ff: Gained carrier Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.950 [INFO][3051] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 09c88490-4bbe-490d-93dd-e9a56555f8cc 1487 0 2025-09-06 00:27:18 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.12 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.950 [INFO][3051] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.978 [INFO][3063] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" HandleID="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Workload="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.980 [INFO][3063] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" HandleID="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Workload="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002511d0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.12", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-06 00:27:18.978598576 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.981 [INFO][3063] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.981 [INFO][3063] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.981 [INFO][3063] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12' Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.987 [INFO][3063] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.991 [INFO][3063] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.995 [INFO][3063] ipam/ipam.go 511: Trying affinity for 192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.997 [INFO][3063] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.998 [INFO][3063] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:18.999 [INFO][3063] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:19.000 [INFO][3063] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:19.004 [INFO][3063] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:19.014 [INFO][3063] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.195/26] block=192.168.25.192/26 handle="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:19.014 [INFO][3063] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.195/26] handle="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" host="10.200.8.12" Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:19.014 [INFO][3063] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:19.047997 env[1416]: 2025-09-06 00:27:19.014 [INFO][3063] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.195/26] IPv6=[] ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" HandleID="k8s-pod-network.943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Workload="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:27:19.050572 env[1416]: 2025-09-06 00:27:19.015 [INFO][3051] cni-plugin/k8s.go 418: Populated endpoint ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"09c88490-4bbe-490d-93dd-e9a56555f8cc", ResourceVersion:"1487", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 27, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:19.050572 env[1416]: 2025-09-06 00:27:19.015 [INFO][3051] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.195/32] ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:27:19.050572 env[1416]: 2025-09-06 00:27:19.015 [INFO][3051] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:27:19.050572 env[1416]: 2025-09-06 00:27:19.033 [INFO][3051] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:27:19.050882 env[1416]: 2025-09-06 00:27:19.035 [INFO][3051] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"09c88490-4bbe-490d-93dd-e9a56555f8cc", ResourceVersion:"1487", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 27, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"6e:38:9b:f2:c0:81", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:19.050882 env[1416]: 2025-09-06 00:27:19.046 [INFO][3051] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.12-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:27:19.067353 env[1416]: time="2025-09-06T00:27:19.067273742Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:27:19.067571 env[1416]: time="2025-09-06T00:27:19.067545047Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:27:19.067715 env[1416]: time="2025-09-06T00:27:19.067690350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:27:19.068072 env[1416]: time="2025-09-06T00:27:19.067999756Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe pid=3086 runtime=io.containerd.runc.v2 Sep 6 00:27:19.082000 audit[3098]: NETFILTER_CFG table=filter:80 family=2 entries=46 op=nft_register_chain pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:19.082000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7ffe8abfc330 a2=0 a3=7ffe8abfc31c items=0 ppid=2545 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:19.082000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:19.098295 systemd[1]: Started cri-containerd-943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe.scope. Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit: BPF prog-id=122 op=LOAD Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3086 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:19.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336336383230633434643632333261656163393934313265663138 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3086 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:19.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336336383230633434643632333261656163393934313265663138 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit: BPF prog-id=123 op=LOAD Sep 6 00:27:19.109000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001de780 items=0 ppid=3086 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:19.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336336383230633434643632333261656163393934313265663138 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit: BPF prog-id=124 op=LOAD Sep 6 00:27:19.109000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001de7c8 items=0 ppid=3086 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:19.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336336383230633434643632333261656163393934313265663138 Sep 6 00:27:19.109000 audit: BPF prog-id=124 op=UNLOAD Sep 6 00:27:19.109000 audit: BPF prog-id=123 op=UNLOAD Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:19.109000 audit: BPF prog-id=125 op=LOAD Sep 6 00:27:19.109000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001debd8 items=0 ppid=3086 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:19.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336336383230633434643632333261656163393934313265663138 Sep 6 00:27:19.137914 env[1416]: time="2025-09-06T00:27:19.137867440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:09c88490-4bbe-490d-93dd-e9a56555f8cc,Namespace:default,Attempt:0,} returns sandbox id \"943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe\"" Sep 6 00:27:19.140607 env[1416]: time="2025-09-06T00:27:19.140569493Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 6 00:27:19.952811 kubelet[1863]: E0906 00:27:19.952766 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:20.777118 systemd-networkd[1558]: cali60e51b789ff: Gained IPv6LL Sep 6 00:27:20.957801 kubelet[1863]: E0906 00:27:20.957761 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:21.958643 kubelet[1863]: E0906 00:27:21.958592 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:22.221950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2156515409.mount: Deactivated successfully. Sep 6 00:27:22.958942 kubelet[1863]: E0906 00:27:22.958897 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:23.959982 kubelet[1863]: E0906 00:27:23.959921 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:24.960858 kubelet[1863]: E0906 00:27:24.960771 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:25.961736 kubelet[1863]: E0906 00:27:25.961677 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:27.226999 kubelet[1863]: E0906 00:27:26.961998 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:27.720086 env[1416]: time="2025-09-06T00:27:27.720031307Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:27.727642 env[1416]: time="2025-09-06T00:27:27.727599732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:27.732896 env[1416]: time="2025-09-06T00:27:27.732860518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:27.739240 env[1416]: time="2025-09-06T00:27:27.739208623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:27.739813 env[1416]: time="2025-09-06T00:27:27.739778633Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 6 00:27:27.742598 env[1416]: time="2025-09-06T00:27:27.742565579Z" level=info msg="CreateContainer within sandbox \"943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 6 00:27:27.782137 env[1416]: time="2025-09-06T00:27:27.782079531Z" level=info msg="CreateContainer within sandbox \"943c6820c44d6232aeac99412ef18eafc3c1e87f04feeeba09062d605ee148fe\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"143b48f6730bd5c4e00f33b3bdaab410ec6ed99af8ac47e2a823096abaf39a52\"" Sep 6 00:27:27.782816 env[1416]: time="2025-09-06T00:27:27.782788442Z" level=info msg="StartContainer for \"143b48f6730bd5c4e00f33b3bdaab410ec6ed99af8ac47e2a823096abaf39a52\"" Sep 6 00:27:27.803465 systemd[1]: Started cri-containerd-143b48f6730bd5c4e00f33b3bdaab410ec6ed99af8ac47e2a823096abaf39a52.scope. Sep 6 00:27:27.827601 kernel: kauditd_printk_skb: 162 callbacks suppressed Sep 6 00:27:27.827724 kernel: audit: type=1400 audit(1757118447.822:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850973 kernel: audit: type=1400 audit(1757118447.822:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.863209 kernel: audit: type=1400 audit(1757118447.822:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.875268 kernel: audit: type=1400 audit(1757118447.822:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.887460 kernel: audit: type=1400 audit(1757118447.822:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.900863 kernel: audit: type=1400 audit(1757118447.822:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.921362 env[1416]: time="2025-09-06T00:27:27.921324828Z" level=info msg="StartContainer for \"143b48f6730bd5c4e00f33b3bdaab410ec6ed99af8ac47e2a823096abaf39a52\" returns successfully" Sep 6 00:27:27.928028 kernel: audit: type=1400 audit(1757118447.822:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.928122 kernel: audit: type=1400 audit(1757118447.822:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.941178 kernel: audit: type=1400 audit(1757118447.822:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.954222 kernel: audit: type=1400 audit(1757118447.822:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.822000 audit: BPF prog-id=126 op=LOAD Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3086 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:27.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336234386636373330626435633465303066333362336264616162 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3086 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:27.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336234386636373330626435633465303066333362336264616162 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.827000 audit: BPF prog-id=127 op=LOAD Sep 6 00:27:27.827000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000374560 items=0 ppid=3086 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:27.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336234386636373330626435633465303066333362336264616162 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit: BPF prog-id=128 op=LOAD Sep 6 00:27:27.850000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000203f58 items=0 ppid=3086 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336234386636373330626435633465303066333362336264616162 Sep 6 00:27:27.850000 audit: BPF prog-id=128 op=UNLOAD Sep 6 00:27:27.850000 audit: BPF prog-id=127 op=UNLOAD Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:27.850000 audit: BPF prog-id=129 op=LOAD Sep 6 00:27:27.850000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000242368 items=0 ppid=3086 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134336234386636373330626435633465303066333362336264616162 Sep 6 00:27:27.962440 kubelet[1863]: E0906 00:27:27.962378 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:27.969000 audit[3167]: AVC avc: denied { search } for pid=3167 comm="rpcbind" name="crypto" dev="proc" ino=26737 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:27:27.969000 audit[3167]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f073adf00c0 a2=0 a3=0 items=0 ppid=3148 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 key=(null) Sep 6 00:27:27.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 6 00:27:28.005000 audit[3172]: AVC avc: denied { search } for pid=3172 comm="dbus-daemon" name="crypto" dev="proc" ino=26737 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:27:28.005000 audit[3172]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7efcd96910c0 a2=0 a3=0 items=0 ppid=3148 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 key=(null) Sep 6 00:27:28.005000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:27:28.008000 audit[3173]: AVC avc: denied { watch } for pid=3173 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537454 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c235,c302 tclass=dir permissive=0 Sep 6 00:27:28.008000 audit[3173]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55fe4cbc3530 a2=2c8 a3=7ffc7244bcec items=0 ppid=3148 pid=3173 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 key=(null) Sep 6 00:27:28.008000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:27:28.013000 audit[3174]: AVC avc: denied { read } for pid=3174 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26071 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 6 00:27:28.013000 audit[3174]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f48b37c1320 a1=80000 a2=d a3=7ffc919c6210 items=0 ppid=3148 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 key=(null) Sep 6 00:27:28.013000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:27:28.014000 audit[3174]: AVC avc: denied { search } for pid=3174 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26737 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:27:28.014000 audit[3174]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f48b2d150c0 a2=0 a3=0 items=0 ppid=3148 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c302 key=(null) Sep 6 00:27:28.014000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:27:28.398255 kubelet[1863]: I0906 00:27:28.398197 1863 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.7971192839999999 podStartE2EDuration="10.398181255s" podCreationTimestamp="2025-09-06 00:27:18 +0000 UTC" firstStartedPulling="2025-09-06 00:27:19.140024083 +0000 UTC m=+46.954076189" lastFinishedPulling="2025-09-06 00:27:27.741086054 +0000 UTC m=+55.555138160" observedRunningTime="2025-09-06 00:27:28.398121954 +0000 UTC m=+56.212174060" watchObservedRunningTime="2025-09-06 00:27:28.398181255 +0000 UTC m=+56.212233361" Sep 6 00:27:28.412000 audit[3179]: NETFILTER_CFG table=filter:81 family=2 entries=20 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:27:28.412000 audit[3179]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe2bf54c90 a2=0 a3=7ffe2bf54c7c items=0 ppid=2116 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:28.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:27:28.417000 audit[3179]: NETFILTER_CFG table=nat:82 family=2 entries=110 op=nft_register_chain pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:27:28.417000 audit[3179]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffe2bf54c90 a2=0 a3=7ffe2bf54c7c items=0 ppid=2116 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:28.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:27:28.963001 kubelet[1863]: E0906 00:27:28.962911 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:29.964041 kubelet[1863]: E0906 00:27:29.963974 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:30.964450 kubelet[1863]: E0906 00:27:30.964393 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:31.964844 kubelet[1863]: E0906 00:27:31.964779 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:32.338449 systemd[1]: run-containerd-runc-k8s.io-524fc92fdb52555532cca68fa70d8403cc86a935e29c3c1076e75de7613875fb-runc.JjMnRR.mount: Deactivated successfully. Sep 6 00:27:32.908014 kubelet[1863]: E0906 00:27:32.907948 1863 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:32.965314 kubelet[1863]: E0906 00:27:32.965269 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:33.002392 env[1416]: time="2025-09-06T00:27:33.002332631Z" level=info msg="StopPodSandbox for \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\"" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.049 [WARNING][3211] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--chlxf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0e1d417-702a-4db0-a4e3-2c2c63621409", ResourceVersion:"1465", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5", Pod:"csi-node-driver-chlxf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib6ecd73bdd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.050 [INFO][3211] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.050 [INFO][3211] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" iface="eth0" netns="" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.050 [INFO][3211] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.050 [INFO][3211] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.071 [INFO][3219] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.071 [INFO][3219] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.071 [INFO][3219] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.078 [WARNING][3219] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.078 [INFO][3219] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.080 [INFO][3219] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:33.082285 env[1416]: 2025-09-06 00:27:33.081 [INFO][3211] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.082902 env[1416]: time="2025-09-06T00:27:33.082857000Z" level=info msg="TearDown network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\" successfully" Sep 6 00:27:33.082997 env[1416]: time="2025-09-06T00:27:33.082897101Z" level=info msg="StopPodSandbox for \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\" returns successfully" Sep 6 00:27:33.083672 env[1416]: time="2025-09-06T00:27:33.083636512Z" level=info msg="RemovePodSandbox for \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\"" Sep 6 00:27:33.083794 env[1416]: time="2025-09-06T00:27:33.083677012Z" level=info msg="Forcibly stopping sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\"" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.118 [WARNING][3234] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-csi--node--driver--chlxf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e0e1d417-702a-4db0-a4e3-2c2c63621409", ResourceVersion:"1465", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"0de8d1c23a7b04ed443cb105cb53a8f2bf5208afdd497292b58d9bda87cb55d5", Pod:"csi-node-driver-chlxf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib6ecd73bdd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.119 [INFO][3234] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.119 [INFO][3234] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" iface="eth0" netns="" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.119 [INFO][3234] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.119 [INFO][3234] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.150 [INFO][3241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.150 [INFO][3241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.150 [INFO][3241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.158 [WARNING][3241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.158 [INFO][3241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" HandleID="k8s-pod-network.33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Workload="10.200.8.12-k8s-csi--node--driver--chlxf-eth0" Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.160 [INFO][3241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:33.163093 env[1416]: 2025-09-06 00:27:33.161 [INFO][3234] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55" Sep 6 00:27:33.163093 env[1416]: time="2025-09-06T00:27:33.162228253Z" level=info msg="TearDown network for sandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\" successfully" Sep 6 00:27:33.171997 env[1416]: time="2025-09-06T00:27:33.171963794Z" level=info msg="RemovePodSandbox \"33105717d2ec6f239ba2a80a85e32ce6f52a8974971cf8542f82ebd5271f4c55\" returns successfully" Sep 6 00:27:33.172701 env[1416]: time="2025-09-06T00:27:33.172674404Z" level=info msg="StopPodSandbox for \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\"" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.206 [WARNING][3256] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"f029bff3-1e82-4af3-9df3-5077a24ef493", ResourceVersion:"1454", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310", Pod:"nginx-deployment-7fcdb87857-txl88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibb8a10f33c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.207 [INFO][3256] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.208 [INFO][3256] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" iface="eth0" netns="" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.208 [INFO][3256] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.208 [INFO][3256] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.231 [INFO][3263] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.231 [INFO][3263] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.231 [INFO][3263] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.240 [WARNING][3263] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.240 [INFO][3263] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.244 [INFO][3263] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:33.247110 env[1416]: 2025-09-06 00:27:33.245 [INFO][3256] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.248044 env[1416]: time="2025-09-06T00:27:33.247995598Z" level=info msg="TearDown network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\" successfully" Sep 6 00:27:33.248196 env[1416]: time="2025-09-06T00:27:33.248173001Z" level=info msg="StopPodSandbox for \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\" returns successfully" Sep 6 00:27:33.248749 env[1416]: time="2025-09-06T00:27:33.248649408Z" level=info msg="RemovePodSandbox for \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\"" Sep 6 00:27:33.248919 env[1416]: time="2025-09-06T00:27:33.248872811Z" level=info msg="Forcibly stopping sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\"" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.288 [WARNING][3279] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"f029bff3-1e82-4af3-9df3-5077a24ef493", ResourceVersion:"1454", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 26, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"b64306e795ce891603d394fff2d64eb6cdd30616988e330b205a790360176310", Pod:"nginx-deployment-7fcdb87857-txl88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibb8a10f33c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.289 [INFO][3279] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.289 [INFO][3279] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" iface="eth0" netns="" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.289 [INFO][3279] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.289 [INFO][3279] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.316 [INFO][3286] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.317 [INFO][3286] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.317 [INFO][3286] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.361 [WARNING][3286] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.361 [INFO][3286] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" HandleID="k8s-pod-network.344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Workload="10.200.8.12-k8s-nginx--deployment--7fcdb87857--txl88-eth0" Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.363 [INFO][3286] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:33.365578 env[1416]: 2025-09-06 00:27:33.364 [INFO][3279] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484" Sep 6 00:27:33.366283 env[1416]: time="2025-09-06T00:27:33.365598506Z" level=info msg="TearDown network for sandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\" successfully" Sep 6 00:27:33.376504 env[1416]: time="2025-09-06T00:27:33.376465263Z" level=info msg="RemovePodSandbox \"344cea6e313927e94ed5954851ee75f59c0c0faaeb225aca8d7b3fb734237484\" returns successfully" Sep 6 00:27:33.966469 kubelet[1863]: E0906 00:27:33.966411 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:34.967059 kubelet[1863]: E0906 00:27:34.966997 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:35.967959 kubelet[1863]: E0906 00:27:35.967898 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:36.969264 kubelet[1863]: E0906 00:27:36.969175 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:37.969639 kubelet[1863]: E0906 00:27:37.969576 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:38.969930 kubelet[1863]: E0906 00:27:38.969881 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:39.970398 kubelet[1863]: E0906 00:27:39.970331 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:40.970746 kubelet[1863]: E0906 00:27:40.970684 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:41.971790 kubelet[1863]: E0906 00:27:41.971730 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:42.973030 kubelet[1863]: E0906 00:27:42.972930 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:43.973106 kubelet[1863]: E0906 00:27:43.973049 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:44.974049 kubelet[1863]: E0906 00:27:44.973995 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:45.975012 kubelet[1863]: E0906 00:27:45.974955 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:46.975732 kubelet[1863]: E0906 00:27:46.975679 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:47.975888 kubelet[1863]: E0906 00:27:47.975824 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:48.976282 kubelet[1863]: E0906 00:27:48.976223 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:49.976443 kubelet[1863]: E0906 00:27:49.976383 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:50.977404 kubelet[1863]: E0906 00:27:50.977342 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:51.978105 kubelet[1863]: E0906 00:27:51.978036 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:52.429716 systemd[1]: Created slice kubepods-besteffort-pod1c031a31_15f2_44dd_bca5_3d81eb282d9b.slice. Sep 6 00:27:52.612827 kubelet[1863]: I0906 00:27:52.612762 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-e3d62f72-bf87-4516-afe4-19ccfbd07e00\" (UniqueName: \"kubernetes.io/nfs/1c031a31-15f2-44dd-bca5-3d81eb282d9b-pvc-e3d62f72-bf87-4516-afe4-19ccfbd07e00\") pod \"test-pod-1\" (UID: \"1c031a31-15f2-44dd-bca5-3d81eb282d9b\") " pod="default/test-pod-1" Sep 6 00:27:52.613066 kubelet[1863]: I0906 00:27:52.612855 1863 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f99ph\" (UniqueName: \"kubernetes.io/projected/1c031a31-15f2-44dd-bca5-3d81eb282d9b-kube-api-access-f99ph\") pod \"test-pod-1\" (UID: \"1c031a31-15f2-44dd-bca5-3d81eb282d9b\") " pod="default/test-pod-1" Sep 6 00:27:52.802562 kernel: Failed to create system directory netfs Sep 6 00:27:52.802718 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 00:27:52.802746 kernel: audit: type=1400 audit(1757118472.791:782): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.802780 kernel: Failed to create system directory netfs Sep 6 00:27:52.791000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.821742 kernel: audit: type=1400 audit(1757118472.791:782): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.821862 kernel: Failed to create system directory netfs Sep 6 00:27:52.791000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.839705 kernel: audit: type=1400 audit(1757118472.791:782): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.839817 kernel: Failed to create system directory netfs Sep 6 00:27:52.791000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.872350 kernel: audit: type=1400 audit(1757118472.791:782): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.791000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.791000 audit[3323]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cd554c45e0 a1=153bc a2=55cd508002b0 a3=5 items=0 ppid=188 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:52.791000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:27:52.890855 kernel: audit: type=1300 audit(1757118472.791:782): arch=c000003e syscall=175 success=yes exit=0 a0=55cd554c45e0 a1=153bc a2=55cd508002b0 a3=5 items=0 ppid=188 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:52.890905 kernel: audit: type=1327 audit(1757118472.791:782): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:27:52.923581 kernel: Failed to create system directory fscache Sep 6 00:27:52.923681 kernel: audit: type=1400 audit(1757118472.901:783): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.923711 kernel: Failed to create system directory fscache Sep 6 00:27:52.923732 kernel: Failed to create system directory fscache Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.924042 kubelet[1863]: E0906 00:27:52.924015 1863 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:52.948057 kernel: Failed to create system directory fscache Sep 6 00:27:52.948171 kernel: audit: type=1400 audit(1757118472.901:783): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.948199 kernel: Failed to create system directory fscache Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.969840 kernel: audit: type=1400 audit(1757118472.901:783): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.969963 kernel: Failed to create system directory fscache Sep 6 00:27:52.969989 kernel: audit: type=1400 audit(1757118472.901:783): avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.985133 kernel: Failed to create system directory fscache Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.985367 kubelet[1863]: E0906 00:27:52.984108 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.990931 kernel: Failed to create system directory fscache Sep 6 00:27:52.990997 kernel: Failed to create system directory fscache Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.997132 kernel: Failed to create system directory fscache Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.000316 kernel: Failed to create system directory fscache Sep 6 00:27:53.000387 kernel: Failed to create system directory fscache Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.006576 kernel: Failed to create system directory fscache Sep 6 00:27:53.006645 kernel: Failed to create system directory fscache Sep 6 00:27:52.901000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:52.901000 audit[3323]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cd556d99c0 a1=4c0fc a2=55cd508002b0 a3=5 items=0 ppid=188 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:52.901000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:27:53.014857 kernel: FS-Cache: Loaded Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.213451 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.213543 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.213568 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.220390 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.220471 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.226541 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.226619 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.232302 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.232359 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.238003 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.238078 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.244209 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.244294 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.249845 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.249917 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.252570 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.257785 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.257865 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.261081 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.266213 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.266859 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.271519 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.271580 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.274067 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.279550 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.279624 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.284536 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.284610 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.289419 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.289491 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.294362 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.294426 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.299176 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.299245 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.303856 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.303922 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.308498 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.308559 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.313092 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.313163 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.317841 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.317901 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.322516 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.322565 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.327733 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.327910 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.332772 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.332997 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.337485 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.337543 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.342673 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.342740 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.347753 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.347803 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.352634 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.352684 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.357681 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.357746 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.362607 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.362670 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.367352 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.368117 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.370851 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.375672 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.375758 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.380765 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.380839 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.383281 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.389552 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.389627 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.398055 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.398132 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.403228 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.403287 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.408293 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.408351 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.413027 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.413091 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.418088 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.418143 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.426791 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.426887 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.432270 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.432340 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.437268 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.437327 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.442223 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.442279 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.447190 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.447252 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.452103 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.452155 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.456843 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.456907 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.462549 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.462611 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.466416 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.466476 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.471699 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.471759 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.475006 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.479309 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.479894 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.484506 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.484551 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.489396 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.489435 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.494299 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.494351 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.499491 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.499529 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.504557 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.504620 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.509533 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.509601 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.514346 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.514396 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.520006 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.520077 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.522655 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.525346 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.530899 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.530956 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.535671 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.535735 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.193000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.540556 kernel: Failed to create system directory sunrpc Sep 6 00:27:53.553058 kernel: RPC: Registered named UNIX socket transport module. Sep 6 00:27:53.553117 kernel: RPC: Registered udp transport module. Sep 6 00:27:53.553145 kernel: RPC: Registered tcp transport module. Sep 6 00:27:53.558285 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 6 00:27:53.193000 audit[3323]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cd55725ad0 a1=1a81bc a2=55cd508002b0 a3=5 items=6 ppid=188 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:53.193000 audit: CWD cwd="/" Sep 6 00:27:53.193000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:53.193000 audit: PATH item=1 name=(null) inode=26402 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:53.193000 audit: PATH item=2 name=(null) inode=26402 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:53.193000 audit: PATH item=3 name=(null) inode=26403 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:53.193000 audit: PATH item=4 name=(null) inode=26402 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:53.193000 audit: PATH item=5 name=(null) inode=26404 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:53.193000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.766542 kernel: Failed to create system directory nfs Sep 6 00:27:53.766611 kernel: Failed to create system directory nfs Sep 6 00:27:53.766638 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.771291 kernel: Failed to create system directory nfs Sep 6 00:27:53.771360 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.776060 kernel: Failed to create system directory nfs Sep 6 00:27:53.776121 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.785214 kernel: Failed to create system directory nfs Sep 6 00:27:53.785268 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.789688 kernel: Failed to create system directory nfs Sep 6 00:27:53.789752 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.794239 kernel: Failed to create system directory nfs Sep 6 00:27:53.794302 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.799438 kernel: Failed to create system directory nfs Sep 6 00:27:53.799497 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.804095 kernel: Failed to create system directory nfs Sep 6 00:27:53.804163 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.808446 kernel: Failed to create system directory nfs Sep 6 00:27:53.808505 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.812986 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.813856 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.818185 kernel: Failed to create system directory nfs Sep 6 00:27:53.818251 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.822788 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.827437 kernel: Failed to create system directory nfs Sep 6 00:27:53.827488 kernel: Failed to create system directory nfs Sep 6 00:27:53.827510 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.832210 kernel: Failed to create system directory nfs Sep 6 00:27:53.832255 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.834849 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.839309 kernel: Failed to create system directory nfs Sep 6 00:27:53.839355 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.843726 kernel: Failed to create system directory nfs Sep 6 00:27:53.843787 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.849353 kernel: Failed to create system directory nfs Sep 6 00:27:53.849405 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.854709 kernel: Failed to create system directory nfs Sep 6 00:27:53.854769 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.859128 kernel: Failed to create system directory nfs Sep 6 00:27:53.859167 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.863949 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.866620 kernel: Failed to create system directory nfs Sep 6 00:27:53.868048 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.871620 kernel: Failed to create system directory nfs Sep 6 00:27:53.871895 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.876200 kernel: Failed to create system directory nfs Sep 6 00:27:53.876253 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.880618 kernel: Failed to create system directory nfs Sep 6 00:27:53.880677 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.884949 kernel: Failed to create system directory nfs Sep 6 00:27:53.885005 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.889301 kernel: Failed to create system directory nfs Sep 6 00:27:53.889358 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.893683 kernel: Failed to create system directory nfs Sep 6 00:27:53.893745 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.898233 kernel: Failed to create system directory nfs Sep 6 00:27:53.898289 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.902527 kernel: Failed to create system directory nfs Sep 6 00:27:53.902627 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.751000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:53.907148 kernel: Failed to create system directory nfs Sep 6 00:27:53.751000 audit[3323]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cd55946af0 a1=16f02c a2=55cd508002b0 a3=5 items=0 ppid=188 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:53.751000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:27:53.929853 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 6 00:27:53.984282 kubelet[1863]: E0906 00:27:53.984241 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.124090 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.124171 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.124195 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.128771 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.128852 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.133557 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.138896 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.138957 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.138981 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.143724 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.143780 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.148323 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.148395 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.152774 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.152852 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.157370 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.157432 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.162103 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.162167 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.167075 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.167148 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.171948 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.171996 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.174367 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.179721 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.179783 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.184655 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.184743 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.187856 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.191498 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.191552 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.198254 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.198310 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.203748 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.203811 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.210367 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.210425 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.214785 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.214841 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.219345 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.219387 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.223670 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.223722 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.228496 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.228549 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.233328 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.233383 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.238088 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.238471 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.245460 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.245510 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.250142 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.250413 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.255996 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.256065 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.260415 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.260467 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.264716 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.264767 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.269140 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.269207 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.273625 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.273694 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.275971 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.280312 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.281017 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.285221 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.285275 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.287934 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.291992 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.292045 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.296286 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.297008 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.301037 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.301087 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.305643 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.305685 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.310155 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.310205 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.314484 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.314542 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.319133 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.319185 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.323825 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.323904 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.328412 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.328473 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.332863 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.332934 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.337454 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.337504 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.341909 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.341966 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.103000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.346266 kernel: Failed to create system directory nfs4 Sep 6 00:27:54.471443 kernel: NFS: Registering the id_resolver key type Sep 6 00:27:54.471570 kernel: Key type id_resolver registered Sep 6 00:27:54.471611 kernel: Key type id_legacy registered Sep 6 00:27:54.103000 audit[3328]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f63bfc62010 a1=20955c a2=55a878d252b0 a3=5 items=0 ppid=188 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:54.103000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.506357 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.506431 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.506457 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.512048 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.512097 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.516566 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.516623 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.521244 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.521313 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.526003 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.526047 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.528850 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.533254 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.535562 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.535608 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.542501 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.542552 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.542579 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.544866 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.549253 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.549305 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.553737 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.553818 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.558311 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.558364 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.496000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:27:54.563010 kernel: Failed to create system directory rpcgss Sep 6 00:27:54.496000 audit[3329]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1ad44c2010 a1=70bac a2=555c3e97d2b0 a3=5 items=0 ppid=50 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:54.496000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 6 00:27:54.715463 nfsidmap[3336]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-4e3667f87b' Sep 6 00:27:54.737680 nfsidmap[3337]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-4e3667f87b' Sep 6 00:27:54.748000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:27:54.748000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:27:54.748000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:27:54.750000 audit[1516]: AVC avc: denied { watch_reads } for pid=1516 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:27:54.750000 audit[1516]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560bfdef72a0 a2=10 a3=dd5ccb7739855c17 items=0 ppid=1 pid=1516 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:54.750000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:27:54.750000 audit[1516]: AVC avc: denied { watch_reads } for pid=1516 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:27:54.750000 audit[1516]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560bfdef72a0 a2=10 a3=dd5ccb7739855c17 items=0 ppid=1 pid=1516 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:54.750000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:27:54.750000 audit[1516]: AVC avc: denied { watch_reads } for pid=1516 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:27:54.750000 audit[1516]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560bfdef72a0 a2=10 a3=dd5ccb7739855c17 items=0 ppid=1 pid=1516 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:54.750000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:27:54.833005 env[1416]: time="2025-09-06T00:27:54.832955362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1c031a31-15f2-44dd-bca5-3d81eb282d9b,Namespace:default,Attempt:0,}" Sep 6 00:27:54.968238 systemd-networkd[1558]: cali5ec59c6bf6e: Link UP Sep 6 00:27:54.976945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:27:54.977050 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 6 00:27:54.977179 systemd-networkd[1558]: cali5ec59c6bf6e: Gained carrier Sep 6 00:27:54.985146 kubelet[1863]: E0906 00:27:54.985110 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.901 [INFO][3338] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.12-k8s-test--pod--1-eth0 default 1c031a31-15f2-44dd-bca5-3d81eb282d9b 1593 0 2025-09-06 00:27:19 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.12 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.901 [INFO][3338] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.926 [INFO][3351] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" HandleID="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Workload="10.200.8.12-k8s-test--pod--1-eth0" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.926 [INFO][3351] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" HandleID="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Workload="10.200.8.12-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bcff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.12", "pod":"test-pod-1", "timestamp":"2025-09-06 00:27:54.926602892 +0000 UTC"}, Hostname:"10.200.8.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.927 [INFO][3351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.927 [INFO][3351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.927 [INFO][3351] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.12' Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.934 [INFO][3351] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.938 [INFO][3351] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.942 [INFO][3351] ipam/ipam.go 511: Trying affinity for 192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.944 [INFO][3351] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.946 [INFO][3351] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.946 [INFO][3351] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.947 [INFO][3351] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529 Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.955 [INFO][3351] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.960 [INFO][3351] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.196/26] block=192.168.25.192/26 handle="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.960 [INFO][3351] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.196/26] handle="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" host="10.200.8.12" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.960 [INFO][3351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.960 [INFO][3351] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.196/26] IPv6=[] ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" HandleID="k8s-pod-network.c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Workload="10.200.8.12-k8s-test--pod--1-eth0" Sep 6 00:27:54.992264 env[1416]: 2025-09-06 00:27:54.961 [INFO][3338] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1c031a31-15f2-44dd-bca5-3d81eb282d9b", ResourceVersion:"1593", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 27, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:54.993303 env[1416]: 2025-09-06 00:27:54.961 [INFO][3338] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.196/32] ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" Sep 6 00:27:54.993303 env[1416]: 2025-09-06 00:27:54.962 [INFO][3338] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" Sep 6 00:27:54.993303 env[1416]: 2025-09-06 00:27:54.977 [INFO][3338] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" Sep 6 00:27:54.993303 env[1416]: 2025-09-06 00:27:54.978 [INFO][3338] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1c031a31-15f2-44dd-bca5-3d81eb282d9b", ResourceVersion:"1593", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 27, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.12", ContainerID:"c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d6:55:80:1f:01:41", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:27:54.993303 env[1416]: 2025-09-06 00:27:54.986 [INFO][3338] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.12-k8s-test--pod--1-eth0" Sep 6 00:27:55.003000 audit[3365]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=3365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:27:55.003000 audit[3365]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffcc36ed410 a2=0 a3=7ffcc36ed3fc items=0 ppid=2545 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.003000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:27:55.008946 env[1416]: time="2025-09-06T00:27:55.008810907Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:27:55.009104 env[1416]: time="2025-09-06T00:27:55.009075810Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:27:55.009210 env[1416]: time="2025-09-06T00:27:55.009187111Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:27:55.009476 env[1416]: time="2025-09-06T00:27:55.009440113Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529 pid=3373 runtime=io.containerd.runc.v2 Sep 6 00:27:55.024283 systemd[1]: Started cri-containerd-c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529.scope. Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit: BPF prog-id=130 op=LOAD Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3373 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336434633739393064376539653438613062653538373266363162 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3373 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336434633739393064376539653438613062653538373266363162 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.040000 audit: BPF prog-id=131 op=LOAD Sep 6 00:27:55.040000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d7c00 items=0 ppid=3373 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336434633739393064376539653438613062653538373266363162 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit: BPF prog-id=132 op=LOAD Sep 6 00:27:55.041000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d7c48 items=0 ppid=3373 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336434633739393064376539653438613062653538373266363162 Sep 6 00:27:55.041000 audit: BPF prog-id=132 op=UNLOAD Sep 6 00:27:55.041000 audit: BPF prog-id=131 op=UNLOAD Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.041000 audit: BPF prog-id=133 op=LOAD Sep 6 00:27:55.041000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2058 items=0 ppid=3373 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336434633739393064376539653438613062653538373266363162 Sep 6 00:27:55.072175 env[1416]: time="2025-09-06T00:27:55.072114926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1c031a31-15f2-44dd-bca5-3d81eb282d9b,Namespace:default,Attempt:0,} returns sandbox id \"c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529\"" Sep 6 00:27:55.073400 env[1416]: time="2025-09-06T00:27:55.073365338Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:27:55.412552 env[1416]: time="2025-09-06T00:27:55.412498753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:55.420094 env[1416]: time="2025-09-06T00:27:55.420037327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:55.425416 env[1416]: time="2025-09-06T00:27:55.425381279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:55.433209 env[1416]: time="2025-09-06T00:27:55.433174956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:27:55.433779 env[1416]: time="2025-09-06T00:27:55.433745961Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:27:55.436498 env[1416]: time="2025-09-06T00:27:55.436466388Z" level=info msg="CreateContainer within sandbox \"c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 6 00:27:55.471430 env[1416]: time="2025-09-06T00:27:55.471386929Z" level=info msg="CreateContainer within sandbox \"c23d4c7990d7e9e48a0be5872f61bc4cacf40864273d17c3ae8d8758014a6529\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"5c82db949ede2aff7cad7935e0fdf52e36deed571c4f0dd6dee17b10205404e0\"" Sep 6 00:27:55.471854 env[1416]: time="2025-09-06T00:27:55.471805033Z" level=info msg="StartContainer for \"5c82db949ede2aff7cad7935e0fdf52e36deed571c4f0dd6dee17b10205404e0\"" Sep 6 00:27:55.488889 systemd[1]: Started cri-containerd-5c82db949ede2aff7cad7935e0fdf52e36deed571c4f0dd6dee17b10205404e0.scope. Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.502000 audit: BPF prog-id=134 op=LOAD Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3373 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383264623934396564653261666637636164373933356530666466 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3373 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383264623934396564653261666637636164373933356530666466 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit: BPF prog-id=135 op=LOAD Sep 6 00:27:55.503000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000242c30 items=0 ppid=3373 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383264623934396564653261666637636164373933356530666466 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit: BPF prog-id=136 op=LOAD Sep 6 00:27:55.503000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000242c78 items=0 ppid=3373 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383264623934396564653261666637636164373933356530666466 Sep 6 00:27:55.503000 audit: BPF prog-id=136 op=UNLOAD Sep 6 00:27:55.503000 audit: BPF prog-id=135 op=UNLOAD Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:27:55.503000 audit: BPF prog-id=137 op=LOAD Sep 6 00:27:55.503000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000243088 items=0 ppid=3373 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383264623934396564653261666637636164373933356530666466 Sep 6 00:27:55.529492 env[1416]: time="2025-09-06T00:27:55.529451397Z" level=info msg="StartContainer for \"5c82db949ede2aff7cad7935e0fdf52e36deed571c4f0dd6dee17b10205404e0\" returns successfully" Sep 6 00:27:55.986329 kubelet[1863]: E0906 00:27:55.986214 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:56.041072 systemd-networkd[1558]: cali5ec59c6bf6e: Gained IPv6LL Sep 6 00:27:56.469285 kubelet[1863]: I0906 00:27:56.469227 1863 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=37.107126575 podStartE2EDuration="37.469213015s" podCreationTimestamp="2025-09-06 00:27:19 +0000 UTC" firstStartedPulling="2025-09-06 00:27:55.073031335 +0000 UTC m=+82.887083441" lastFinishedPulling="2025-09-06 00:27:55.435117775 +0000 UTC m=+83.249169881" observedRunningTime="2025-09-06 00:27:56.46868271 +0000 UTC m=+84.282734816" watchObservedRunningTime="2025-09-06 00:27:56.469213015 +0000 UTC m=+84.283265221" Sep 6 00:27:56.986657 kubelet[1863]: E0906 00:27:56.986599 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:57.986925 kubelet[1863]: E0906 00:27:57.986866 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:58.987349 kubelet[1863]: E0906 00:27:58.987292 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:27:59.987765 kubelet[1863]: E0906 00:27:59.987708 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:28:00.987981 kubelet[1863]: E0906 00:28:00.987919 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:28:01.988341 kubelet[1863]: E0906 00:28:01.988283 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:28:02.336082 systemd[1]: run-containerd-runc-k8s.io-524fc92fdb52555532cca68fa70d8403cc86a935e29c3c1076e75de7613875fb-runc.F55pVc.mount: Deactivated successfully. Sep 6 00:28:02.989109 kubelet[1863]: E0906 00:28:02.989071 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:28:03.989355 kubelet[1863]: E0906 00:28:03.989281 1863 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"