Sep 6 00:22:37.095564 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 00:22:37.095588 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:22:37.095599 kernel: BIOS-provided physical RAM map: Sep 6 00:22:37.095605 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 6 00:22:37.095610 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Sep 6 00:22:37.095618 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Sep 6 00:22:37.095628 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc4fff] reserved Sep 6 00:22:37.095635 kernel: BIOS-e820: [mem 0x000000003ffc5000-0x000000003ffd1fff] usable Sep 6 00:22:37.095643 kernel: BIOS-e820: [mem 0x000000003ffd2000-0x000000003fffafff] ACPI data Sep 6 00:22:37.095649 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Sep 6 00:22:37.095654 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Sep 6 00:22:37.095662 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Sep 6 00:22:37.095669 kernel: printk: bootconsole [earlyser0] enabled Sep 6 00:22:37.095675 kernel: NX (Execute Disable) protection: active Sep 6 00:22:37.095690 kernel: efi: EFI v2.70 by Microsoft Sep 6 00:22:37.095697 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f33fa98 RNG=0x3ffd2018 Sep 6 00:22:37.095703 kernel: random: crng init done Sep 6 00:22:37.095712 kernel: SMBIOS 3.1.0 present. Sep 6 00:22:37.095719 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 6 00:22:37.095726 kernel: Hypervisor detected: Microsoft Hyper-V Sep 6 00:22:37.095736 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Sep 6 00:22:37.095743 kernel: Hyper-V Host Build:26100-10.0-1-0.1293 Sep 6 00:22:37.095752 kernel: Hyper-V: Nested features: 0x1e0101 Sep 6 00:22:37.095761 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Sep 6 00:22:37.095767 kernel: Hyper-V: Using hypercall for remote TLB flush Sep 6 00:22:37.095776 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Sep 6 00:22:37.095783 kernel: tsc: Marking TSC unstable due to running on Hyper-V Sep 6 00:22:37.095790 kernel: tsc: Detected 2593.905 MHz processor Sep 6 00:22:37.095797 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 00:22:37.095803 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 00:22:37.095813 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Sep 6 00:22:37.095819 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 00:22:37.095831 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Sep 6 00:22:37.095838 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Sep 6 00:22:37.095844 kernel: Using GB pages for direct mapping Sep 6 00:22:37.095853 kernel: Secure boot disabled Sep 6 00:22:37.095860 kernel: ACPI: Early table checksum verification disabled Sep 6 00:22:37.095867 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Sep 6 00:22:37.095877 kernel: ACPI: XSDT 0x000000003FFF90E8 00005C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095883 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095897 kernel: ACPI: DSDT 0x000000003FFD6000 01E11C (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 6 00:22:37.095905 kernel: ACPI: FACS 0x000000003FFFE000 000040 Sep 6 00:22:37.095913 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095923 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095929 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095936 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095948 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095955 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 00:22:37.095964 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Sep 6 00:22:37.095973 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff411b] Sep 6 00:22:37.095979 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Sep 6 00:22:37.095988 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Sep 6 00:22:37.095996 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Sep 6 00:22:37.096003 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Sep 6 00:22:37.096013 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Sep 6 00:22:37.096022 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Sep 6 00:22:37.096029 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Sep 6 00:22:37.096039 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 00:22:37.096045 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 00:22:37.096055 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Sep 6 00:22:37.096063 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Sep 6 00:22:37.096069 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Sep 6 00:22:37.096079 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Sep 6 00:22:37.096086 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Sep 6 00:22:37.096098 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Sep 6 00:22:37.096106 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Sep 6 00:22:37.096112 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Sep 6 00:22:37.096121 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Sep 6 00:22:37.096129 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Sep 6 00:22:37.096136 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Sep 6 00:22:37.096146 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Sep 6 00:22:37.096153 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Sep 6 00:22:37.096162 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Sep 6 00:22:37.096172 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Sep 6 00:22:37.096179 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Sep 6 00:22:37.096189 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Sep 6 00:22:37.096196 kernel: NODE_DATA(0) allocated [mem 0x2bfff9000-0x2bfffefff] Sep 6 00:22:37.096203 kernel: Zone ranges: Sep 6 00:22:37.096214 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 00:22:37.096221 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 6 00:22:37.096229 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Sep 6 00:22:37.096240 kernel: Movable zone start for each node Sep 6 00:22:37.096259 kernel: Early memory node ranges Sep 6 00:22:37.096266 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 6 00:22:37.096275 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Sep 6 00:22:37.096283 kernel: node 0: [mem 0x000000003ffc5000-0x000000003ffd1fff] Sep 6 00:22:37.096290 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Sep 6 00:22:37.096297 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Sep 6 00:22:37.096303 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Sep 6 00:22:37.096310 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 00:22:37.096320 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 6 00:22:37.096330 kernel: On node 0, zone DMA32: 132 pages in unavailable ranges Sep 6 00:22:37.096337 kernel: On node 0, zone DMA32: 45 pages in unavailable ranges Sep 6 00:22:37.096347 kernel: ACPI: PM-Timer IO Port: 0x408 Sep 6 00:22:37.096354 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Sep 6 00:22:37.096361 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Sep 6 00:22:37.096369 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 00:22:37.096378 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 00:22:37.096385 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Sep 6 00:22:37.096403 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 6 00:22:37.096411 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Sep 6 00:22:37.096417 kernel: Booting paravirtualized kernel on Hyper-V Sep 6 00:22:37.096428 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 00:22:37.096435 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 6 00:22:37.096444 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 6 00:22:37.096452 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 6 00:22:37.096458 kernel: pcpu-alloc: [0] 0 1 Sep 6 00:22:37.096465 kernel: Hyper-V: PV spinlocks enabled Sep 6 00:22:37.096477 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 00:22:37.096484 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062375 Sep 6 00:22:37.096494 kernel: Policy zone: Normal Sep 6 00:22:37.096502 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:22:37.096509 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 00:22:37.096519 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 6 00:22:37.096526 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 6 00:22:37.096537 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 00:22:37.096546 kernel: Memory: 8069176K/8387512K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 318076K reserved, 0K cma-reserved) Sep 6 00:22:37.096553 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 6 00:22:37.096570 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 00:22:37.096582 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 00:22:37.096590 kernel: rcu: Hierarchical RCU implementation. Sep 6 00:22:37.096597 kernel: rcu: RCU event tracing is enabled. Sep 6 00:22:37.096607 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 6 00:22:37.096616 kernel: Rude variant of Tasks RCU enabled. Sep 6 00:22:37.096624 kernel: Tracing variant of Tasks RCU enabled. Sep 6 00:22:37.096633 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 00:22:37.096640 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 6 00:22:37.096649 kernel: Using NULL legacy PIC Sep 6 00:22:37.096660 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Sep 6 00:22:37.096669 kernel: Console: colour dummy device 80x25 Sep 6 00:22:37.096678 kernel: printk: console [tty1] enabled Sep 6 00:22:37.096685 kernel: printk: console [ttyS0] enabled Sep 6 00:22:37.096694 kernel: printk: bootconsole [earlyser0] disabled Sep 6 00:22:37.096705 kernel: ACPI: Core revision 20210730 Sep 6 00:22:37.096713 kernel: Failed to register legacy timer interrupt Sep 6 00:22:37.096723 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 00:22:37.096730 kernel: Hyper-V: Using IPI hypercalls Sep 6 00:22:37.096739 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Sep 6 00:22:37.096748 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 6 00:22:37.096756 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Sep 6 00:22:37.096765 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 00:22:37.096772 kernel: Spectre V2 : Mitigation: Retpolines Sep 6 00:22:37.096782 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 6 00:22:37.096793 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 6 00:22:37.096800 kernel: RETBleed: Vulnerable Sep 6 00:22:37.096807 kernel: Speculative Store Bypass: Vulnerable Sep 6 00:22:37.096814 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Sep 6 00:22:37.096823 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 6 00:22:37.096831 kernel: active return thunk: its_return_thunk Sep 6 00:22:37.096838 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 00:22:37.096847 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 00:22:37.096856 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 00:22:37.096864 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 00:22:37.096874 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 6 00:22:37.096883 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 6 00:22:37.096890 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 6 00:22:37.096898 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 00:22:37.096908 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 6 00:22:37.096915 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 6 00:22:37.096927 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 6 00:22:37.096934 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Sep 6 00:22:37.096941 kernel: Freeing SMP alternatives memory: 32K Sep 6 00:22:37.096952 kernel: pid_max: default: 32768 minimum: 301 Sep 6 00:22:37.096959 kernel: LSM: Security Framework initializing Sep 6 00:22:37.096971 kernel: SELinux: Initializing. Sep 6 00:22:37.096979 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 00:22:37.096986 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 00:22:37.096996 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Sep 6 00:22:37.097003 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Sep 6 00:22:37.097014 kernel: signal: max sigframe size: 3632 Sep 6 00:22:37.097022 kernel: rcu: Hierarchical SRCU implementation. Sep 6 00:22:37.097029 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 00:22:37.097036 kernel: smp: Bringing up secondary CPUs ... Sep 6 00:22:37.097047 kernel: x86: Booting SMP configuration: Sep 6 00:22:37.097056 kernel: .... node #0, CPUs: #1 Sep 6 00:22:37.097067 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Sep 6 00:22:37.097075 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 6 00:22:37.097083 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 00:22:37.097093 kernel: smpboot: Max logical packages: 1 Sep 6 00:22:37.097100 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Sep 6 00:22:37.097110 kernel: devtmpfs: initialized Sep 6 00:22:37.097118 kernel: x86/mm: Memory block size: 128MB Sep 6 00:22:37.097127 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Sep 6 00:22:37.097138 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 00:22:37.097145 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 6 00:22:37.097155 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 00:22:37.097163 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 00:22:37.097170 kernel: audit: initializing netlink subsys (disabled) Sep 6 00:22:37.097181 kernel: audit: type=2000 audit(1757118155.024:1): state=initialized audit_enabled=0 res=1 Sep 6 00:22:37.097188 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 00:22:37.097199 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 00:22:37.097208 kernel: cpuidle: using governor menu Sep 6 00:22:37.097216 kernel: ACPI: bus type PCI registered Sep 6 00:22:37.097226 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 00:22:37.097233 kernel: dca service started, version 1.12.1 Sep 6 00:22:37.097249 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 00:22:37.097256 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 00:22:37.097265 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 00:22:37.097274 kernel: ACPI: Added _OSI(Module Device) Sep 6 00:22:37.097282 kernel: ACPI: Added _OSI(Processor Device) Sep 6 00:22:37.097293 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 00:22:37.097301 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 00:22:37.097309 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 00:22:37.097318 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 00:22:37.097326 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 00:22:37.097336 kernel: ACPI: Interpreter enabled Sep 6 00:22:37.097343 kernel: ACPI: PM: (supports S0 S5) Sep 6 00:22:37.097351 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 00:22:37.097361 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 00:22:37.097372 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Sep 6 00:22:37.097381 kernel: iommu: Default domain type: Translated Sep 6 00:22:37.097388 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 00:22:37.097395 kernel: vgaarb: loaded Sep 6 00:22:37.097404 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 00:22:37.097413 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 00:22:37.097423 kernel: PTP clock support registered Sep 6 00:22:37.097431 kernel: Registered efivars operations Sep 6 00:22:37.097439 kernel: PCI: Using ACPI for IRQ routing Sep 6 00:22:37.097449 kernel: PCI: System does not support PCI Sep 6 00:22:37.097458 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Sep 6 00:22:37.097469 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 00:22:37.097476 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 00:22:37.097483 kernel: pnp: PnP ACPI init Sep 6 00:22:37.097493 kernel: pnp: PnP ACPI: found 3 devices Sep 6 00:22:37.097501 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 00:22:37.097512 kernel: NET: Registered PF_INET protocol family Sep 6 00:22:37.097520 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 00:22:37.097528 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 6 00:22:37.097540 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 00:22:37.097547 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 6 00:22:37.097557 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 6 00:22:37.097565 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 6 00:22:37.097572 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 6 00:22:37.097583 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 6 00:22:37.097590 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 00:22:37.097600 kernel: NET: Registered PF_XDP protocol family Sep 6 00:22:37.097610 kernel: PCI: CLS 0 bytes, default 64 Sep 6 00:22:37.097618 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 6 00:22:37.097628 kernel: software IO TLB: mapped [mem 0x000000003aa89000-0x000000003ea89000] (64MB) Sep 6 00:22:37.097636 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 00:22:37.097646 kernel: Initialise system trusted keyrings Sep 6 00:22:37.097653 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 6 00:22:37.097660 kernel: Key type asymmetric registered Sep 6 00:22:37.097670 kernel: Asymmetric key parser 'x509' registered Sep 6 00:22:37.097677 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 00:22:37.097690 kernel: io scheduler mq-deadline registered Sep 6 00:22:37.097697 kernel: io scheduler kyber registered Sep 6 00:22:37.097704 kernel: io scheduler bfq registered Sep 6 00:22:37.097715 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 00:22:37.097722 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 00:22:37.097732 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 00:22:37.097740 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 6 00:22:37.097747 kernel: i8042: PNP: No PS/2 controller found. Sep 6 00:22:37.097882 kernel: rtc_cmos 00:02: registered as rtc0 Sep 6 00:22:37.097976 kernel: rtc_cmos 00:02: setting system clock to 2025-09-06T00:22:36 UTC (1757118156) Sep 6 00:22:37.098061 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Sep 6 00:22:37.098071 kernel: intel_pstate: CPU model not supported Sep 6 00:22:37.098081 kernel: efifb: probing for efifb Sep 6 00:22:37.098089 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 6 00:22:37.098099 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 6 00:22:37.098106 kernel: efifb: scrolling: redraw Sep 6 00:22:37.098114 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 6 00:22:37.098126 kernel: Console: switching to colour frame buffer device 128x48 Sep 6 00:22:37.098135 kernel: fb0: EFI VGA frame buffer device Sep 6 00:22:37.098145 kernel: pstore: Registered efi as persistent store backend Sep 6 00:22:37.098152 kernel: NET: Registered PF_INET6 protocol family Sep 6 00:22:37.098160 kernel: Segment Routing with IPv6 Sep 6 00:22:37.098170 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 00:22:37.098177 kernel: NET: Registered PF_PACKET protocol family Sep 6 00:22:37.098188 kernel: Key type dns_resolver registered Sep 6 00:22:37.098195 kernel: IPI shorthand broadcast: enabled Sep 6 00:22:37.098205 kernel: sched_clock: Marking stable (874734100, 26345600)->(1143172300, -242092600) Sep 6 00:22:37.098215 kernel: registered taskstats version 1 Sep 6 00:22:37.098223 kernel: Loading compiled-in X.509 certificates Sep 6 00:22:37.098234 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 00:22:37.098248 kernel: Key type .fscrypt registered Sep 6 00:22:37.098259 kernel: Key type fscrypt-provisioning registered Sep 6 00:22:37.098266 kernel: pstore: Using crash dump compression: deflate Sep 6 00:22:37.098277 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 00:22:37.098285 kernel: ima: Allocated hash algorithm: sha1 Sep 6 00:22:37.098295 kernel: ima: No architecture policies found Sep 6 00:22:37.098305 kernel: clk: Disabling unused clocks Sep 6 00:22:37.098312 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 00:22:37.098323 kernel: Write protecting the kernel read-only data: 28672k Sep 6 00:22:37.098330 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 00:22:37.098338 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 00:22:37.098348 kernel: Run /init as init process Sep 6 00:22:37.098356 kernel: with arguments: Sep 6 00:22:37.098366 kernel: /init Sep 6 00:22:37.098375 kernel: with environment: Sep 6 00:22:37.098383 kernel: HOME=/ Sep 6 00:22:37.098393 kernel: TERM=linux Sep 6 00:22:37.098400 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 00:22:37.098412 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:22:37.098422 systemd[1]: Detected virtualization microsoft. Sep 6 00:22:37.098432 systemd[1]: Detected architecture x86-64. Sep 6 00:22:37.098442 systemd[1]: Running in initrd. Sep 6 00:22:37.098452 systemd[1]: No hostname configured, using default hostname. Sep 6 00:22:37.098460 systemd[1]: Hostname set to . Sep 6 00:22:37.098468 systemd[1]: Initializing machine ID from random generator. Sep 6 00:22:37.098479 systemd[1]: Queued start job for default target initrd.target. Sep 6 00:22:37.098487 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:22:37.098498 systemd[1]: Reached target cryptsetup.target. Sep 6 00:22:37.098506 systemd[1]: Reached target paths.target. Sep 6 00:22:37.098513 systemd[1]: Reached target slices.target. Sep 6 00:22:37.098526 systemd[1]: Reached target swap.target. Sep 6 00:22:37.098534 systemd[1]: Reached target timers.target. Sep 6 00:22:37.098545 systemd[1]: Listening on iscsid.socket. Sep 6 00:22:37.098553 systemd[1]: Listening on iscsiuio.socket. Sep 6 00:22:37.098560 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 00:22:37.098568 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 00:22:37.098579 systemd[1]: Listening on systemd-journald.socket. Sep 6 00:22:37.098589 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:22:37.098600 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:22:37.098608 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:22:37.098617 systemd[1]: Reached target sockets.target. Sep 6 00:22:37.098626 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:22:37.098635 systemd[1]: Finished network-cleanup.service. Sep 6 00:22:37.098645 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 00:22:37.098653 systemd[1]: Starting systemd-journald.service... Sep 6 00:22:37.098661 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:22:37.098673 systemd[1]: Starting systemd-resolved.service... Sep 6 00:22:37.098683 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 00:22:37.098692 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:22:37.098700 kernel: audit: type=1130 audit(1757118157.094:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.098716 systemd-journald[183]: Journal started Sep 6 00:22:37.098763 systemd-journald[183]: Runtime Journal (/run/log/journal/f39f763cc70c455bb8fa3db57603a428) is 8.0M, max 159.0M, 151.0M free. Sep 6 00:22:37.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.071431 systemd-modules-load[184]: Inserted module 'overlay' Sep 6 00:22:37.123179 systemd[1]: Started systemd-journald.service. Sep 6 00:22:37.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.147256 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 00:22:37.147288 kernel: audit: type=1130 audit(1757118157.146:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.160917 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 00:22:37.181402 kernel: Bridge firewalling registered Sep 6 00:22:37.181430 kernel: audit: type=1130 audit(1757118157.163:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.163833 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 00:22:37.181290 systemd-modules-load[184]: Inserted module 'br_netfilter' Sep 6 00:22:37.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.201018 systemd-resolved[185]: Positive Trust Anchors: Sep 6 00:22:37.218450 kernel: audit: type=1130 audit(1757118157.198:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.218483 kernel: SCSI subsystem initialized Sep 6 00:22:37.201030 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:22:37.201064 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:22:37.203694 systemd-resolved[185]: Defaulting to hostname 'linux'. Sep 6 00:22:37.241824 systemd[1]: Started systemd-resolved.service. Sep 6 00:22:37.260769 systemd[1]: Reached target nss-lookup.target. Sep 6 00:22:37.288591 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 00:22:37.288623 kernel: device-mapper: uevent: version 1.0.3 Sep 6 00:22:37.288635 kernel: audit: type=1130 audit(1757118157.260:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.288648 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 00:22:37.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.286587 systemd-modules-load[184]: Inserted module 'dm_multipath' Sep 6 00:22:37.287327 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 00:22:37.296747 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:22:37.301252 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:22:37.306815 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:22:37.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.322260 kernel: audit: type=1130 audit(1757118157.299:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.330577 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:22:37.348328 kernel: audit: type=1130 audit(1757118157.333:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.350306 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:22:37.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.366260 kernel: audit: type=1130 audit(1757118157.352:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.367661 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 00:22:37.390436 kernel: audit: type=1130 audit(1757118157.367:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.370472 systemd[1]: Starting dracut-cmdline.service... Sep 6 00:22:37.396603 dracut-cmdline[205]: dracut-dracut-053 Sep 6 00:22:37.400733 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:22:37.476264 kernel: Loading iSCSI transport class v2.0-870. Sep 6 00:22:37.496266 kernel: iscsi: registered transport (tcp) Sep 6 00:22:37.524303 kernel: iscsi: registered transport (qla4xxx) Sep 6 00:22:37.524380 kernel: QLogic iSCSI HBA Driver Sep 6 00:22:37.554306 systemd[1]: Finished dracut-cmdline.service. Sep 6 00:22:37.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:37.558929 systemd[1]: Starting dracut-pre-udev.service... Sep 6 00:22:37.610267 kernel: raid6: avx512x4 gen() 18312 MB/s Sep 6 00:22:37.638263 kernel: raid6: avx512x4 xor() 7050 MB/s Sep 6 00:22:37.659258 kernel: raid6: avx512x2 gen() 18404 MB/s Sep 6 00:22:37.679257 kernel: raid6: avx512x2 xor() 29742 MB/s Sep 6 00:22:37.700264 kernel: raid6: avx512x1 gen() 18298 MB/s Sep 6 00:22:37.720254 kernel: raid6: avx512x1 xor() 26789 MB/s Sep 6 00:22:37.740253 kernel: raid6: avx2x4 gen() 18339 MB/s Sep 6 00:22:37.764255 kernel: raid6: avx2x4 xor() 6944 MB/s Sep 6 00:22:37.785257 kernel: raid6: avx2x2 gen() 18322 MB/s Sep 6 00:22:37.806258 kernel: raid6: avx2x2 xor() 22174 MB/s Sep 6 00:22:37.826261 kernel: raid6: avx2x1 gen() 13967 MB/s Sep 6 00:22:37.846256 kernel: raid6: avx2x1 xor() 19125 MB/s Sep 6 00:22:37.867256 kernel: raid6: sse2x4 gen() 11683 MB/s Sep 6 00:22:37.889252 kernel: raid6: sse2x4 xor() 6356 MB/s Sep 6 00:22:37.909255 kernel: raid6: sse2x2 gen() 12848 MB/s Sep 6 00:22:37.930257 kernel: raid6: sse2x2 xor() 7510 MB/s Sep 6 00:22:37.950255 kernel: raid6: sse2x1 gen() 11591 MB/s Sep 6 00:22:37.973923 kernel: raid6: sse2x1 xor() 5919 MB/s Sep 6 00:22:37.973956 kernel: raid6: using algorithm avx512x2 gen() 18404 MB/s Sep 6 00:22:37.973970 kernel: raid6: .... xor() 29742 MB/s, rmw enabled Sep 6 00:22:37.978454 kernel: raid6: using avx512x2 recovery algorithm Sep 6 00:22:37.999270 kernel: xor: automatically using best checksumming function avx Sep 6 00:22:38.096271 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 00:22:38.104483 systemd[1]: Finished dracut-pre-udev.service. Sep 6 00:22:38.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:38.109000 audit: BPF prog-id=7 op=LOAD Sep 6 00:22:38.109000 audit: BPF prog-id=8 op=LOAD Sep 6 00:22:38.110701 systemd[1]: Starting systemd-udevd.service... Sep 6 00:22:38.125948 systemd-udevd[382]: Using default interface naming scheme 'v252'. Sep 6 00:22:38.130784 systemd[1]: Started systemd-udevd.service. Sep 6 00:22:38.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:38.142716 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 00:22:38.157539 dracut-pre-trigger[403]: rd.md=0: removing MD RAID activation Sep 6 00:22:38.188475 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 00:22:38.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:38.194417 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:22:38.230067 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:22:38.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:38.281713 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 00:22:38.294208 kernel: hv_vmbus: Vmbus version:5.2 Sep 6 00:22:38.331269 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 6 00:22:38.340525 kernel: AVX2 version of gcm_enc/dec engaged. Sep 6 00:22:38.340582 kernel: AES CTR mode by8 optimization enabled Sep 6 00:22:38.349260 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 00:22:38.361268 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 6 00:22:38.376750 kernel: hv_vmbus: registering driver hid_hyperv Sep 6 00:22:38.376799 kernel: hv_vmbus: registering driver hv_netvsc Sep 6 00:22:38.376818 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 6 00:22:38.376833 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 6 00:22:38.394271 kernel: hv_vmbus: registering driver hv_storvsc Sep 6 00:22:38.401649 kernel: scsi host0: storvsc_host_t Sep 6 00:22:38.401839 kernel: scsi host1: storvsc_host_t Sep 6 00:22:38.401864 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 6 00:22:38.417263 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 5 Sep 6 00:22:38.449010 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 6 00:22:38.449982 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 6 00:22:38.450000 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 6 00:22:38.465742 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 6 00:22:38.492652 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 6 00:22:38.492853 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 6 00:22:38.493027 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#134 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 6 00:22:38.493206 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 6 00:22:38.493392 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 6 00:22:38.493553 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:22:38.493571 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 6 00:22:38.525273 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#71 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 6 00:22:38.602049 kernel: hv_netvsc 7c1e52fb-312f-7c1e-52fb-312f7c1e52fb eth0: VF slot 1 added Sep 6 00:22:38.612264 kernel: hv_vmbus: registering driver hv_pci Sep 6 00:22:38.619614 kernel: hv_pci 894a079d-dffe-4712-b7e2-aee7cdfd612c: PCI VMBus probing: Using version 0x10004 Sep 6 00:22:38.688215 kernel: hv_pci 894a079d-dffe-4712-b7e2-aee7cdfd612c: PCI host bridge to bus dffe:00 Sep 6 00:22:38.688420 kernel: pci_bus dffe:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Sep 6 00:22:38.688597 kernel: pci_bus dffe:00: No busn resource found for root bus, will use [bus 00-ff] Sep 6 00:22:38.688752 kernel: pci dffe:00:02.0: [15b3:1016] type 00 class 0x020000 Sep 6 00:22:38.688894 kernel: pci dffe:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 6 00:22:38.688999 kernel: pci dffe:00:02.0: enabling Extended Tags Sep 6 00:22:38.689099 kernel: pci dffe:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at dffe:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Sep 6 00:22:38.689197 kernel: pci_bus dffe:00: busn_res: [bus 00-ff] end is updated to 00 Sep 6 00:22:38.689356 kernel: pci dffe:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 6 00:22:38.784297 kernel: mlx5_core dffe:00:02.0: enabling device (0000 -> 0002) Sep 6 00:22:39.059184 kernel: mlx5_core dffe:00:02.0: firmware version: 14.30.5000 Sep 6 00:22:39.059398 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (443) Sep 6 00:22:39.059417 kernel: mlx5_core dffe:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Sep 6 00:22:39.059578 kernel: mlx5_core dffe:00:02.0: Supported tc offload range - chains: 1, prios: 1 Sep 6 00:22:39.059701 kernel: mlx5_core dffe:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Sep 6 00:22:39.059799 kernel: hv_netvsc 7c1e52fb-312f-7c1e-52fb-312f7c1e52fb eth0: VF registering: eth1 Sep 6 00:22:39.059898 kernel: mlx5_core dffe:00:02.0 eth1: joined to eth0 Sep 6 00:22:38.947740 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 00:22:38.956078 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:22:39.073258 kernel: mlx5_core dffe:00:02.0 enP57342s1: renamed from eth1 Sep 6 00:22:39.092908 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 00:22:39.096297 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 00:22:39.123203 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 00:22:39.126925 systemd[1]: Starting disk-uuid.service... Sep 6 00:22:39.144070 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:22:39.169281 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:22:40.176268 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 00:22:40.176687 disk-uuid[568]: The operation has completed successfully. Sep 6 00:22:40.253428 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 00:22:40.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.253549 systemd[1]: Finished disk-uuid.service. Sep 6 00:22:40.258640 systemd[1]: Starting verity-setup.service... Sep 6 00:22:40.298262 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 6 00:22:40.539061 systemd[1]: Found device dev-mapper-usr.device. Sep 6 00:22:40.547403 systemd[1]: Finished verity-setup.service. Sep 6 00:22:40.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.552679 systemd[1]: Mounting sysusr-usr.mount... Sep 6 00:22:40.629020 systemd[1]: Mounted sysusr-usr.mount. Sep 6 00:22:40.635314 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 00:22:40.631450 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 00:22:40.632317 systemd[1]: Starting ignition-setup.service... Sep 6 00:22:40.637525 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 00:22:40.667639 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:22:40.667706 kernel: BTRFS info (device sda6): using free space tree Sep 6 00:22:40.667727 kernel: BTRFS info (device sda6): has skinny extents Sep 6 00:22:40.715313 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 00:22:40.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.720000 audit: BPF prog-id=9 op=LOAD Sep 6 00:22:40.720926 systemd[1]: Starting systemd-networkd.service... Sep 6 00:22:40.749274 systemd-networkd[806]: lo: Link UP Sep 6 00:22:40.749285 systemd-networkd[806]: lo: Gained carrier Sep 6 00:22:40.753956 systemd-networkd[806]: Enumeration completed Sep 6 00:22:40.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.754049 systemd[1]: Started systemd-networkd.service. Sep 6 00:22:40.756722 systemd[1]: Reached target network.target. Sep 6 00:22:40.757521 systemd-networkd[806]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:22:40.769552 systemd[1]: Starting iscsiuio.service... Sep 6 00:22:40.779285 systemd[1]: Started iscsiuio.service. Sep 6 00:22:40.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.785510 systemd[1]: Starting iscsid.service... Sep 6 00:22:40.791766 iscsid[814]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:22:40.791766 iscsid[814]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 00:22:40.791766 iscsid[814]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 00:22:40.791766 iscsid[814]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 00:22:40.791766 iscsid[814]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:22:40.791766 iscsid[814]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 00:22:40.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.808090 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 00:22:40.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.810489 systemd[1]: Started iscsid.service. Sep 6 00:22:40.827022 systemd[1]: Starting dracut-initqueue.service... Sep 6 00:22:40.864985 kernel: mlx5_core dffe:00:02.0 enP57342s1: Link up Sep 6 00:22:40.847143 systemd[1]: Finished dracut-initqueue.service. Sep 6 00:22:40.852401 systemd[1]: Reached target remote-fs-pre.target. Sep 6 00:22:40.854800 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:22:40.864983 systemd[1]: Reached target remote-fs.target. Sep 6 00:22:40.877012 systemd[1]: Starting dracut-pre-mount.service... Sep 6 00:22:40.885527 systemd[1]: Finished dracut-pre-mount.service. Sep 6 00:22:40.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.901587 kernel: hv_netvsc 7c1e52fb-312f-7c1e-52fb-312f7c1e52fb eth0: Data path switched to VF: enP57342s1 Sep 6 00:22:40.902675 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:22:40.902021 systemd-networkd[806]: enP57342s1: Link UP Sep 6 00:22:40.902165 systemd-networkd[806]: eth0: Link UP Sep 6 00:22:40.902386 systemd-networkd[806]: eth0: Gained carrier Sep 6 00:22:40.907601 systemd-networkd[806]: enP57342s1: Gained carrier Sep 6 00:22:40.930330 systemd-networkd[806]: eth0: DHCPv4 address 10.200.8.21/24, gateway 10.200.8.1 acquired from 168.63.129.16 Sep 6 00:22:40.983415 systemd[1]: Finished ignition-setup.service. Sep 6 00:22:40.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:40.989144 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 00:22:42.908481 systemd-networkd[806]: eth0: Gained IPv6LL Sep 6 00:22:43.960214 ignition[833]: Ignition 2.14.0 Sep 6 00:22:43.962206 ignition[833]: Stage: fetch-offline Sep 6 00:22:43.962316 ignition[833]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:22:43.962368 ignition[833]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:22:44.150072 ignition[833]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:22:44.150336 ignition[833]: parsed url from cmdline: "" Sep 6 00:22:44.150343 ignition[833]: no config URL provided Sep 6 00:22:44.150351 ignition[833]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:22:44.150359 ignition[833]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:22:44.150366 ignition[833]: failed to fetch config: resource requires networking Sep 6 00:22:44.154984 ignition[833]: Ignition finished successfully Sep 6 00:22:44.166071 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 00:22:44.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.170069 systemd[1]: Starting ignition-fetch.service... Sep 6 00:22:44.194715 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 6 00:22:44.194746 kernel: audit: type=1130 audit(1757118164.168:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.197064 ignition[839]: Ignition 2.14.0 Sep 6 00:22:44.197075 ignition[839]: Stage: fetch Sep 6 00:22:44.197215 ignition[839]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:22:44.197270 ignition[839]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:22:44.200416 ignition[839]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:22:44.200845 ignition[839]: parsed url from cmdline: "" Sep 6 00:22:44.200850 ignition[839]: no config URL provided Sep 6 00:22:44.200856 ignition[839]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:22:44.200868 ignition[839]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:22:44.200915 ignition[839]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 6 00:22:44.279450 ignition[839]: GET result: OK Sep 6 00:22:44.279524 ignition[839]: config has been read from IMDS userdata Sep 6 00:22:44.279541 ignition[839]: parsing config with SHA512: 1d8c0eed569c86fd407c49efbdd384319620119fe9120a3e7b26c072dd6d08ebe405c025a23ac287fe2b4e5779dc350e8ce0d6ee35c96efaf2ff22f6fec89385 Sep 6 00:22:44.282398 unknown[839]: fetched base config from "system" Sep 6 00:22:44.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.282782 ignition[839]: fetch: fetch complete Sep 6 00:22:44.305724 kernel: audit: type=1130 audit(1757118164.286:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.282405 unknown[839]: fetched base config from "system" Sep 6 00:22:44.282789 ignition[839]: fetch: fetch passed Sep 6 00:22:44.282413 unknown[839]: fetched user config from "azure" Sep 6 00:22:44.282829 ignition[839]: Ignition finished successfully Sep 6 00:22:44.284225 systemd[1]: Finished ignition-fetch.service. Sep 6 00:22:44.288022 systemd[1]: Starting ignition-kargs.service... Sep 6 00:22:44.327402 ignition[846]: Ignition 2.14.0 Sep 6 00:22:44.327415 ignition[846]: Stage: kargs Sep 6 00:22:44.327562 ignition[846]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:22:44.327598 ignition[846]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:22:44.339207 ignition[846]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:22:44.340125 ignition[846]: kargs: kargs passed Sep 6 00:22:44.346033 systemd[1]: Finished ignition-kargs.service. Sep 6 00:22:44.366748 kernel: audit: type=1130 audit(1757118164.350:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.340172 ignition[846]: Ignition finished successfully Sep 6 00:22:44.369682 systemd[1]: Starting ignition-disks.service... Sep 6 00:22:44.372622 ignition[852]: Ignition 2.14.0 Sep 6 00:22:44.372636 ignition[852]: Stage: disks Sep 6 00:22:44.372737 ignition[852]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:22:44.395694 kernel: audit: type=1130 audit(1757118164.380:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.378411 systemd[1]: Finished ignition-disks.service. Sep 6 00:22:44.372758 ignition[852]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:22:44.381142 systemd[1]: Reached target initrd-root-device.target. Sep 6 00:22:44.375772 ignition[852]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:22:44.400748 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:22:44.377512 ignition[852]: disks: disks passed Sep 6 00:22:44.377565 ignition[852]: Ignition finished successfully Sep 6 00:22:44.414178 systemd[1]: Reached target local-fs.target. Sep 6 00:22:44.418479 systemd[1]: Reached target sysinit.target. Sep 6 00:22:44.423081 systemd[1]: Reached target basic.target. Sep 6 00:22:44.428206 systemd[1]: Starting systemd-fsck-root.service... Sep 6 00:22:44.505236 systemd-fsck[860]: ROOT: clean, 629/7326000 files, 481084/7359488 blocks Sep 6 00:22:44.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.512536 systemd[1]: Finished systemd-fsck-root.service. Sep 6 00:22:44.536481 kernel: audit: type=1130 audit(1757118164.517:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:44.519515 systemd[1]: Mounting sysroot.mount... Sep 6 00:22:44.546268 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 00:22:44.546384 systemd[1]: Mounted sysroot.mount. Sep 6 00:22:44.551476 systemd[1]: Reached target initrd-root-fs.target. Sep 6 00:22:44.585151 systemd[1]: Mounting sysroot-usr.mount... Sep 6 00:22:44.591106 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 6 00:22:44.602779 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 00:22:44.603923 systemd[1]: Reached target ignition-diskful.target. Sep 6 00:22:44.614686 systemd[1]: Mounted sysroot-usr.mount. Sep 6 00:22:44.666024 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:22:44.671958 systemd[1]: Starting initrd-setup-root.service... Sep 6 00:22:44.688261 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (871) Sep 6 00:22:44.692948 initrd-setup-root[876]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 00:22:44.702774 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:22:44.702797 kernel: BTRFS info (device sda6): using free space tree Sep 6 00:22:44.702809 kernel: BTRFS info (device sda6): has skinny extents Sep 6 00:22:44.710722 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:22:44.716709 initrd-setup-root[902]: cut: /sysroot/etc/group: No such file or directory Sep 6 00:22:44.737429 initrd-setup-root[910]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 00:22:44.742379 initrd-setup-root[918]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 00:22:45.214892 systemd[1]: Finished initrd-setup-root.service. Sep 6 00:22:45.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:45.232269 kernel: audit: type=1130 audit(1757118165.217:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:45.232418 systemd[1]: Starting ignition-mount.service... Sep 6 00:22:45.240315 systemd[1]: Starting sysroot-boot.service... Sep 6 00:22:45.246879 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 6 00:22:45.247028 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 6 00:22:45.267754 ignition[937]: INFO : Ignition 2.14.0 Sep 6 00:22:45.267754 ignition[937]: INFO : Stage: mount Sep 6 00:22:45.272563 ignition[937]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:22:45.272563 ignition[937]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:22:45.272563 ignition[937]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:22:45.289444 ignition[937]: INFO : mount: mount passed Sep 6 00:22:45.289444 ignition[937]: INFO : Ignition finished successfully Sep 6 00:22:45.307170 kernel: audit: type=1130 audit(1757118165.289:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:45.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:45.276757 systemd[1]: Finished ignition-mount.service. Sep 6 00:22:45.310392 systemd[1]: Finished sysroot-boot.service. Sep 6 00:22:45.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:45.326264 kernel: audit: type=1130 audit(1757118165.312:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:46.002699 coreos-metadata[870]: Sep 06 00:22:46.002 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 6 00:22:46.018435 coreos-metadata[870]: Sep 06 00:22:46.018 INFO Fetch successful Sep 6 00:22:46.055453 coreos-metadata[870]: Sep 06 00:22:46.055 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 6 00:22:46.069698 coreos-metadata[870]: Sep 06 00:22:46.069 INFO Fetch successful Sep 6 00:22:46.089599 coreos-metadata[870]: Sep 06 00:22:46.089 INFO wrote hostname ci-3510.3.8-n-0e63f2a0ae to /sysroot/etc/hostname Sep 6 00:22:46.091650 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 6 00:22:46.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:46.097917 systemd[1]: Starting ignition-files.service... Sep 6 00:22:46.121765 kernel: audit: type=1130 audit(1757118166.096:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:46.127782 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:22:46.142274 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (949) Sep 6 00:22:46.142325 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:22:46.153069 kernel: BTRFS info (device sda6): using free space tree Sep 6 00:22:46.153097 kernel: BTRFS info (device sda6): has skinny extents Sep 6 00:22:46.161709 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:22:46.177121 ignition[968]: INFO : Ignition 2.14.0 Sep 6 00:22:46.177121 ignition[968]: INFO : Stage: files Sep 6 00:22:46.182360 ignition[968]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:22:46.182360 ignition[968]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:22:46.193040 ignition[968]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:22:46.205757 ignition[968]: DEBUG : files: compiled without relabeling support, skipping Sep 6 00:22:46.209661 ignition[968]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 00:22:46.209661 ignition[968]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 00:22:46.290727 ignition[968]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 00:22:46.295413 ignition[968]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 00:22:46.295413 ignition[968]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 6 00:22:46.295413 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:22:46.291485 unknown[968]: wrote ssh authorized keys file for user: core Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1766692249" Sep 6 00:22:46.359385 ignition[968]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1766692249": device or resource busy Sep 6 00:22:46.359385 ignition[968]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1766692249", trying btrfs: device or resource busy Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1766692249" Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1766692249" Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1766692249" Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1766692249" Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3445720196" Sep 6 00:22:46.359385 ignition[968]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3445720196": device or resource busy Sep 6 00:22:46.359385 ignition[968]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3445720196", trying btrfs: device or resource busy Sep 6 00:22:46.359385 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3445720196" Sep 6 00:22:46.303005 systemd[1]: mnt-oem1766692249.mount: Deactivated successfully. Sep 6 00:22:46.446174 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3445720196" Sep 6 00:22:46.446174 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3445720196" Sep 6 00:22:46.446174 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3445720196" Sep 6 00:22:46.446174 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 00:22:46.446174 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:22:46.446174 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Sep 6 00:22:46.861205 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 6 00:22:47.308502 ignition[968]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:22:47.308502 ignition[968]: INFO : files: op(f): [started] processing unit "waagent.service" Sep 6 00:22:47.308502 ignition[968]: INFO : files: op(f): [finished] processing unit "waagent.service" Sep 6 00:22:47.308502 ignition[968]: INFO : files: op(10): [started] processing unit "nvidia.service" Sep 6 00:22:47.308502 ignition[968]: INFO : files: op(10): [finished] processing unit "nvidia.service" Sep 6 00:22:47.308502 ignition[968]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Sep 6 00:22:47.355081 kernel: audit: type=1130 audit(1757118167.317:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.355195 ignition[968]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Sep 6 00:22:47.355195 ignition[968]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Sep 6 00:22:47.355195 ignition[968]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Sep 6 00:22:47.355195 ignition[968]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:22:47.355195 ignition[968]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:22:47.355195 ignition[968]: INFO : files: files passed Sep 6 00:22:47.355195 ignition[968]: INFO : Ignition finished successfully Sep 6 00:22:47.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.314644 systemd[1]: Finished ignition-files.service. Sep 6 00:22:47.319331 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 00:22:47.394280 initrd-setup-root-after-ignition[991]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 00:22:47.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.337826 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 00:22:47.348768 systemd[1]: Starting ignition-quench.service... Sep 6 00:22:47.351226 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 00:22:47.389311 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 00:22:47.389457 systemd[1]: Finished ignition-quench.service. Sep 6 00:22:47.398820 systemd[1]: Reached target ignition-complete.target. Sep 6 00:22:47.416003 systemd[1]: Starting initrd-parse-etc.service... Sep 6 00:22:47.432648 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 00:22:47.432756 systemd[1]: Finished initrd-parse-etc.service. Sep 6 00:22:47.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.439880 systemd[1]: Reached target initrd-fs.target. Sep 6 00:22:47.444572 systemd[1]: Reached target initrd.target. Sep 6 00:22:47.448725 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 00:22:47.452886 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 00:22:47.463872 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 00:22:47.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.469069 systemd[1]: Starting initrd-cleanup.service... Sep 6 00:22:47.479399 systemd[1]: Stopped target nss-lookup.target. Sep 6 00:22:47.481897 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 00:22:47.486382 systemd[1]: Stopped target timers.target. Sep 6 00:22:47.494324 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 00:22:47.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.494504 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 00:22:47.499001 systemd[1]: Stopped target initrd.target. Sep 6 00:22:47.503451 systemd[1]: Stopped target basic.target. Sep 6 00:22:47.507911 systemd[1]: Stopped target ignition-complete.target. Sep 6 00:22:47.512425 systemd[1]: Stopped target ignition-diskful.target. Sep 6 00:22:47.516843 systemd[1]: Stopped target initrd-root-device.target. Sep 6 00:22:47.521906 systemd[1]: Stopped target remote-fs.target. Sep 6 00:22:47.526619 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 00:22:47.531566 systemd[1]: Stopped target sysinit.target. Sep 6 00:22:47.535909 systemd[1]: Stopped target local-fs.target. Sep 6 00:22:47.540769 systemd[1]: Stopped target local-fs-pre.target. Sep 6 00:22:47.545300 systemd[1]: Stopped target swap.target. Sep 6 00:22:47.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.549441 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 00:22:47.549598 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 00:22:47.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.554119 systemd[1]: Stopped target cryptsetup.target. Sep 6 00:22:47.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.557958 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 00:22:47.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.558105 systemd[1]: Stopped dracut-initqueue.service. Sep 6 00:22:47.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.563113 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 00:22:47.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.599841 ignition[1006]: INFO : Ignition 2.14.0 Sep 6 00:22:47.599841 ignition[1006]: INFO : Stage: umount Sep 6 00:22:47.599841 ignition[1006]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:22:47.599841 ignition[1006]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 00:22:47.563257 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 00:22:47.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.625288 ignition[1006]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 00:22:47.625288 ignition[1006]: INFO : umount: umount passed Sep 6 00:22:47.625288 ignition[1006]: INFO : Ignition finished successfully Sep 6 00:22:47.568001 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 00:22:47.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.568136 systemd[1]: Stopped ignition-files.service. Sep 6 00:22:47.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.572710 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 6 00:22:47.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.572840 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 6 00:22:47.579210 systemd[1]: Stopping ignition-mount.service... Sep 6 00:22:47.582360 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 00:22:47.582520 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 00:22:47.586557 systemd[1]: Stopping sysroot-boot.service... Sep 6 00:22:47.588829 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 00:22:47.588991 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 00:22:47.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.591688 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 00:22:47.591822 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 00:22:47.600463 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 00:22:47.600562 systemd[1]: Finished initrd-cleanup.service. Sep 6 00:22:47.627033 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 00:22:47.627536 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 00:22:47.627636 systemd[1]: Stopped ignition-mount.service. Sep 6 00:22:47.636839 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 00:22:47.636895 systemd[1]: Stopped ignition-disks.service. Sep 6 00:22:47.641792 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 00:22:47.641853 systemd[1]: Stopped ignition-kargs.service. Sep 6 00:22:47.644140 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 00:22:47.644190 systemd[1]: Stopped ignition-fetch.service. Sep 6 00:22:47.646373 systemd[1]: Stopped target network.target. Sep 6 00:22:47.650850 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 00:22:47.650913 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 00:22:47.653687 systemd[1]: Stopped target paths.target. Sep 6 00:22:47.658928 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 00:22:47.662282 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 00:22:47.666716 systemd[1]: Stopped target slices.target. Sep 6 00:22:47.671404 systemd[1]: Stopped target sockets.target. Sep 6 00:22:47.673457 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 00:22:47.673489 systemd[1]: Closed iscsid.socket. Sep 6 00:22:47.677505 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 00:22:47.677541 systemd[1]: Closed iscsiuio.socket. Sep 6 00:22:47.681776 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 00:22:47.681838 systemd[1]: Stopped ignition-setup.service. Sep 6 00:22:47.691671 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:22:47.696424 systemd[1]: Stopping systemd-resolved.service... Sep 6 00:22:47.758899 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 00:22:47.761569 systemd[1]: Stopped systemd-resolved.service. Sep 6 00:22:47.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.767294 systemd-networkd[806]: eth0: DHCPv6 lease lost Sep 6 00:22:47.769914 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:22:47.772639 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:22:47.772000 audit: BPF prog-id=6 op=UNLOAD Sep 6 00:22:47.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.780000 audit: BPF prog-id=9 op=UNLOAD Sep 6 00:22:47.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.774503 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 00:22:47.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.774538 systemd[1]: Closed systemd-networkd.socket. Sep 6 00:22:47.775560 systemd[1]: Stopping network-cleanup.service... Sep 6 00:22:47.775734 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 00:22:47.775789 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 00:22:47.780791 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 00:22:47.780843 systemd[1]: Stopped systemd-sysctl.service. Sep 6 00:22:47.785221 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 00:22:47.785320 systemd[1]: Stopped systemd-modules-load.service. Sep 6 00:22:47.790993 systemd[1]: Stopping systemd-udevd.service... Sep 6 00:22:47.814033 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 00:22:47.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.814645 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 00:22:47.814776 systemd[1]: Stopped systemd-udevd.service. Sep 6 00:22:47.822753 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 00:22:47.822814 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 00:22:47.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.826707 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 00:22:47.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.826744 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 00:22:47.832002 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 00:22:47.832056 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 00:22:47.837172 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 00:22:47.837224 systemd[1]: Stopped dracut-cmdline.service. Sep 6 00:22:47.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.839632 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 00:22:47.839673 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 00:22:47.846207 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 00:22:47.857694 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 00:22:47.857767 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 00:22:47.860857 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 00:22:47.892176 kernel: hv_netvsc 7c1e52fb-312f-7c1e-52fb-312f7c1e52fb eth0: Data path switched from VF: enP57342s1 Sep 6 00:22:47.860957 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 00:22:47.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:47.906330 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 00:22:47.906433 systemd[1]: Stopped network-cleanup.service. Sep 6 00:22:47.999546 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 00:22:47.999672 systemd[1]: Stopped sysroot-boot.service. Sep 6 00:22:48.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:48.007058 systemd[1]: Reached target initrd-switch-root.target. Sep 6 00:22:48.012529 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 00:22:48.012602 systemd[1]: Stopped initrd-setup-root.service. Sep 6 00:22:48.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:22:48.020887 systemd[1]: Starting initrd-switch-root.service... Sep 6 00:22:48.032412 systemd[1]: Switching root. Sep 6 00:22:48.062138 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Sep 6 00:22:48.062269 iscsid[814]: iscsid shutting down. Sep 6 00:22:48.064330 systemd-journald[183]: Journal stopped Sep 6 00:23:01.826746 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 00:23:01.826791 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 00:23:01.826808 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 00:23:01.826821 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 00:23:01.826834 kernel: SELinux: policy capability open_perms=1 Sep 6 00:23:01.826848 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 00:23:01.826864 kernel: SELinux: policy capability always_check_network=0 Sep 6 00:23:01.826881 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 00:23:01.826894 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 00:23:01.826908 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 00:23:01.826921 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 00:23:01.826936 kernel: kauditd_printk_skb: 40 callbacks suppressed Sep 6 00:23:01.826950 kernel: audit: type=1403 audit(1757118170.302:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:23:01.826969 systemd[1]: Successfully loaded SELinux policy in 322.433ms. Sep 6 00:23:01.826993 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 36.899ms. Sep 6 00:23:01.827012 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:23:01.827029 systemd[1]: Detected virtualization microsoft. Sep 6 00:23:01.827043 systemd[1]: Detected architecture x86-64. Sep 6 00:23:01.827057 systemd[1]: Detected first boot. Sep 6 00:23:01.827076 systemd[1]: Hostname set to . Sep 6 00:23:01.827091 systemd[1]: Initializing machine ID from random generator. Sep 6 00:23:01.827106 kernel: audit: type=1400 audit(1757118171.007:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:23:01.827121 kernel: audit: type=1400 audit(1757118171.007:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:23:01.827135 kernel: audit: type=1334 audit(1757118171.025:82): prog-id=10 op=LOAD Sep 6 00:23:01.827149 kernel: audit: type=1334 audit(1757118171.025:83): prog-id=10 op=UNLOAD Sep 6 00:23:01.827166 kernel: audit: type=1334 audit(1757118171.025:84): prog-id=11 op=LOAD Sep 6 00:23:01.827180 kernel: audit: type=1334 audit(1757118171.025:85): prog-id=11 op=UNLOAD Sep 6 00:23:01.827195 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 00:23:01.827210 kernel: audit: type=1400 audit(1757118172.382:86): avc: denied { associate } for pid=1039 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:23:01.827227 kernel: audit: type=1300 audit(1757118172.382:86): arch=c000003e syscall=188 success=yes exit=0 a0=c00018a7cc a1=c00018ea80 a2=c00019ccc0 a3=32 items=0 ppid=1022 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:01.827291 kernel: audit: type=1327 audit(1757118172.382:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:23:01.827309 systemd[1]: Populated /etc with preset unit settings. Sep 6 00:23:01.827328 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:23:01.827344 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:23:01.827361 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:23:01.827377 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 6 00:23:01.827391 kernel: audit: type=1334 audit(1757118181.182:88): prog-id=12 op=LOAD Sep 6 00:23:01.827406 kernel: audit: type=1334 audit(1757118181.182:89): prog-id=3 op=UNLOAD Sep 6 00:23:01.827422 kernel: audit: type=1334 audit(1757118181.187:90): prog-id=13 op=LOAD Sep 6 00:23:01.827439 kernel: audit: type=1334 audit(1757118181.192:91): prog-id=14 op=LOAD Sep 6 00:23:01.827455 kernel: audit: type=1334 audit(1757118181.192:92): prog-id=4 op=UNLOAD Sep 6 00:23:01.827472 kernel: audit: type=1334 audit(1757118181.192:93): prog-id=5 op=UNLOAD Sep 6 00:23:01.827487 kernel: audit: type=1334 audit(1757118181.198:94): prog-id=15 op=LOAD Sep 6 00:23:01.827502 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 00:23:01.827518 kernel: audit: type=1334 audit(1757118181.198:95): prog-id=12 op=UNLOAD Sep 6 00:23:01.827532 kernel: audit: type=1334 audit(1757118181.203:96): prog-id=16 op=LOAD Sep 6 00:23:01.827548 kernel: audit: type=1334 audit(1757118181.209:97): prog-id=17 op=LOAD Sep 6 00:23:01.827563 systemd[1]: Stopped iscsiuio.service. Sep 6 00:23:01.827583 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 00:23:01.827600 systemd[1]: Stopped iscsid.service. Sep 6 00:23:01.827615 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 00:23:01.827632 systemd[1]: Stopped initrd-switch-root.service. Sep 6 00:23:01.827649 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 00:23:01.827667 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 00:23:01.827683 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 00:23:01.827700 systemd[1]: Created slice system-getty.slice. Sep 6 00:23:01.827720 systemd[1]: Created slice system-modprobe.slice. Sep 6 00:23:01.827736 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 00:23:01.827752 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 00:23:01.827768 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 00:23:01.827784 systemd[1]: Created slice user.slice. Sep 6 00:23:01.827800 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:23:01.827817 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 00:23:01.827834 systemd[1]: Set up automount boot.automount. Sep 6 00:23:01.827850 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 00:23:01.827867 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 00:23:01.827883 systemd[1]: Stopped target initrd-fs.target. Sep 6 00:23:01.827897 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 00:23:01.827912 systemd[1]: Reached target integritysetup.target. Sep 6 00:23:01.827926 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:23:01.827940 systemd[1]: Reached target remote-fs.target. Sep 6 00:23:01.827956 systemd[1]: Reached target slices.target. Sep 6 00:23:01.827971 systemd[1]: Reached target swap.target. Sep 6 00:23:01.827988 systemd[1]: Reached target torcx.target. Sep 6 00:23:01.827999 systemd[1]: Reached target veritysetup.target. Sep 6 00:23:01.828009 systemd[1]: Listening on systemd-coredump.socket. Sep 6 00:23:01.828018 systemd[1]: Listening on systemd-initctl.socket. Sep 6 00:23:01.828030 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:23:01.828040 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:23:01.828050 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:23:01.828059 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 00:23:01.828069 systemd[1]: Mounting dev-hugepages.mount... Sep 6 00:23:01.828080 systemd[1]: Mounting dev-mqueue.mount... Sep 6 00:23:01.828094 systemd[1]: Mounting media.mount... Sep 6 00:23:01.828104 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:01.828114 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 00:23:01.828130 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 00:23:01.828139 systemd[1]: Mounting tmp.mount... Sep 6 00:23:01.828149 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 00:23:01.828163 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:01.828172 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:23:01.828183 systemd[1]: Starting modprobe@configfs.service... Sep 6 00:23:01.828196 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:01.828205 systemd[1]: Starting modprobe@drm.service... Sep 6 00:23:01.828219 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:01.828234 systemd[1]: Starting modprobe@fuse.service... Sep 6 00:23:01.828258 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:01.828271 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 00:23:01.828285 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 00:23:01.828295 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 00:23:01.828305 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 00:23:01.828317 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 00:23:01.828328 systemd[1]: Stopped systemd-journald.service. Sep 6 00:23:01.828342 kernel: loop: module loaded Sep 6 00:23:01.828354 systemd[1]: Starting systemd-journald.service... Sep 6 00:23:01.828366 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:23:01.828377 kernel: fuse: init (API version 7.34) Sep 6 00:23:01.828396 systemd[1]: Starting systemd-network-generator.service... Sep 6 00:23:01.828406 systemd[1]: Starting systemd-remount-fs.service... Sep 6 00:23:01.828415 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:23:01.828428 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 00:23:01.828440 systemd[1]: Stopped verity-setup.service. Sep 6 00:23:01.828453 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:01.828466 systemd[1]: Mounted dev-hugepages.mount. Sep 6 00:23:01.828478 systemd[1]: Mounted dev-mqueue.mount. Sep 6 00:23:01.828489 systemd[1]: Mounted media.mount. Sep 6 00:23:01.828502 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 00:23:01.828513 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 00:23:01.828533 systemd[1]: Mounted tmp.mount. Sep 6 00:23:01.828549 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 00:23:01.828559 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:23:01.828570 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 00:23:01.828583 systemd[1]: Finished modprobe@configfs.service. Sep 6 00:23:01.828601 systemd-journald[1120]: Journal started Sep 6 00:23:01.828659 systemd-journald[1120]: Runtime Journal (/run/log/journal/0251cd27465e41b594acb42214c3a2d2) is 8.0M, max 159.0M, 151.0M free. Sep 6 00:22:50.302000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:22:51.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:22:51.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:22:51.025000 audit: BPF prog-id=10 op=LOAD Sep 6 00:22:51.025000 audit: BPF prog-id=10 op=UNLOAD Sep 6 00:22:51.025000 audit: BPF prog-id=11 op=LOAD Sep 6 00:22:51.025000 audit: BPF prog-id=11 op=UNLOAD Sep 6 00:22:52.382000 audit[1039]: AVC avc: denied { associate } for pid=1039 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:22:52.382000 audit[1039]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018a7cc a1=c00018ea80 a2=c00019ccc0 a3=32 items=0 ppid=1022 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:22:52.382000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:22:52.390000 audit[1039]: AVC avc: denied { associate } for pid=1039 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 00:22:52.390000 audit[1039]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018a8a5 a2=1ed a3=0 items=2 ppid=1022 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:22:52.390000 audit: CWD cwd="/" Sep 6 00:22:52.390000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:22:52.390000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:22:52.390000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:23:01.182000 audit: BPF prog-id=12 op=LOAD Sep 6 00:23:01.182000 audit: BPF prog-id=3 op=UNLOAD Sep 6 00:23:01.187000 audit: BPF prog-id=13 op=LOAD Sep 6 00:23:01.192000 audit: BPF prog-id=14 op=LOAD Sep 6 00:23:01.192000 audit: BPF prog-id=4 op=UNLOAD Sep 6 00:23:01.192000 audit: BPF prog-id=5 op=UNLOAD Sep 6 00:23:01.198000 audit: BPF prog-id=15 op=LOAD Sep 6 00:23:01.198000 audit: BPF prog-id=12 op=UNLOAD Sep 6 00:23:01.203000 audit: BPF prog-id=16 op=LOAD Sep 6 00:23:01.209000 audit: BPF prog-id=17 op=LOAD Sep 6 00:23:01.209000 audit: BPF prog-id=13 op=UNLOAD Sep 6 00:23:01.209000 audit: BPF prog-id=14 op=UNLOAD Sep 6 00:23:01.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.250000 audit: BPF prog-id=15 op=UNLOAD Sep 6 00:23:01.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.668000 audit: BPF prog-id=18 op=LOAD Sep 6 00:23:01.669000 audit: BPF prog-id=19 op=LOAD Sep 6 00:23:01.669000 audit: BPF prog-id=20 op=LOAD Sep 6 00:23:01.669000 audit: BPF prog-id=16 op=UNLOAD Sep 6 00:23:01.669000 audit: BPF prog-id=17 op=UNLOAD Sep 6 00:23:01.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.822000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 00:23:01.822000 audit[1120]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd690a81b0 a2=4000 a3=7ffd690a824c items=0 ppid=1 pid=1120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:01.822000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 00:23:01.180097 systemd[1]: Queued start job for default target multi-user.target. Sep 6 00:22:52.337028 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:23:01.180110 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 6 00:22:52.352561 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:23:01.210611 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 00:22:52.352591 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:22:52.352649 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 00:22:52.352660 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 00:22:52.352704 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 00:22:52.352720 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 00:22:52.352940 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 00:22:52.352978 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:22:52.352990 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:22:52.367077 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 00:22:52.367138 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 00:22:52.367179 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 00:22:52.367216 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 00:22:52.367238 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 00:22:52.367282 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 00:22:59.923364 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:22:59.923623 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:22:59.923750 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:22:59.923928 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:22:59.923976 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 00:22:59.924031 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-09-06T00:22:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 00:23:01.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.842706 systemd[1]: Started systemd-journald.service. Sep 6 00:23:01.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.844812 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:01.845104 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:01.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.848195 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:23:01.848388 systemd[1]: Finished modprobe@drm.service. Sep 6 00:23:01.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.851010 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:01.851164 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:01.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.853970 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 00:23:01.854120 systemd[1]: Finished modprobe@fuse.service. Sep 6 00:23:01.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.856807 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:01.856958 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:01.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.859498 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:23:01.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.862561 systemd[1]: Finished systemd-network-generator.service. Sep 6 00:23:01.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.865596 systemd[1]: Finished systemd-remount-fs.service. Sep 6 00:23:01.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.868633 systemd[1]: Reached target network-pre.target. Sep 6 00:23:01.872393 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 00:23:01.876748 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 00:23:01.880945 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 00:23:01.899482 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 00:23:01.903522 systemd[1]: Starting systemd-journal-flush.service... Sep 6 00:23:01.906343 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:01.907669 systemd[1]: Starting systemd-random-seed.service... Sep 6 00:23:01.910091 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:23:01.911533 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:23:01.915344 systemd[1]: Starting systemd-sysusers.service... Sep 6 00:23:01.921121 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 00:23:01.924114 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 00:23:01.937999 systemd[1]: Finished systemd-random-seed.service. Sep 6 00:23:01.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.940676 systemd[1]: Reached target first-boot-complete.target. Sep 6 00:23:01.961424 systemd-journald[1120]: Time spent on flushing to /var/log/journal/0251cd27465e41b594acb42214c3a2d2 is 28.335ms for 1139 entries. Sep 6 00:23:01.961424 systemd-journald[1120]: System Journal (/var/log/journal/0251cd27465e41b594acb42214c3a2d2) is 8.0M, max 2.6G, 2.6G free. Sep 6 00:23:02.091666 systemd-journald[1120]: Received client request to flush runtime journal. Sep 6 00:23:01.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:02.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:01.991071 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:23:02.092137 udevadm[1164]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 6 00:23:02.039061 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:23:02.043426 systemd[1]: Starting systemd-udev-settle.service... Sep 6 00:23:02.092913 systemd[1]: Finished systemd-journal-flush.service. Sep 6 00:23:02.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:02.454012 systemd[1]: Finished systemd-sysusers.service. Sep 6 00:23:02.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:03.218934 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 00:23:03.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:03.222000 audit: BPF prog-id=21 op=LOAD Sep 6 00:23:03.222000 audit: BPF prog-id=22 op=LOAD Sep 6 00:23:03.222000 audit: BPF prog-id=7 op=UNLOAD Sep 6 00:23:03.222000 audit: BPF prog-id=8 op=UNLOAD Sep 6 00:23:03.223313 systemd[1]: Starting systemd-udevd.service... Sep 6 00:23:03.242720 systemd-udevd[1166]: Using default interface naming scheme 'v252'. Sep 6 00:23:03.897852 systemd[1]: Started systemd-udevd.service. Sep 6 00:23:03.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:03.906000 audit: BPF prog-id=23 op=LOAD Sep 6 00:23:03.907552 systemd[1]: Starting systemd-networkd.service... Sep 6 00:23:03.940167 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 00:23:04.006303 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 00:23:04.008000 audit: BPF prog-id=24 op=LOAD Sep 6 00:23:04.008000 audit: BPF prog-id=25 op=LOAD Sep 6 00:23:04.008000 audit: BPF prog-id=26 op=LOAD Sep 6 00:23:04.009993 systemd[1]: Starting systemd-userdbd.service... Sep 6 00:23:04.031000 audit[1170]: AVC avc: denied { confidentiality } for pid=1170 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 00:23:04.056277 kernel: hv_vmbus: registering driver hyperv_fb Sep 6 00:23:04.063166 systemd[1]: Started systemd-userdbd.service. Sep 6 00:23:04.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:04.078467 kernel: hv_utils: Registering HyperV Utility Driver Sep 6 00:23:04.078563 kernel: hv_vmbus: registering driver hv_utils Sep 6 00:23:04.094285 kernel: hv_vmbus: registering driver hv_balloon Sep 6 00:23:04.107094 kernel: hv_utils: Heartbeat IC version 3.0 Sep 6 00:23:04.107203 kernel: hv_utils: Shutdown IC version 3.2 Sep 6 00:23:04.107230 kernel: hv_utils: TimeSync IC version 4.0 Sep 6 00:23:04.342991 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 6 00:23:04.343097 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 6 00:23:04.350567 kernel: Console: switching to colour dummy device 80x25 Sep 6 00:23:04.360311 kernel: Console: switching to colour frame buffer device 128x48 Sep 6 00:23:04.394985 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 6 00:23:04.395107 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 6 00:23:04.031000 audit[1170]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fd7f7c7760 a1=f83c a2=7f899c351bc5 a3=5 items=12 ppid=1166 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:04.031000 audit: CWD cwd="/" Sep 6 00:23:04.031000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=1 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=2 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=3 name=(null) inode=15411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=4 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=5 name=(null) inode=15412 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=6 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=7 name=(null) inode=15413 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=8 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=9 name=(null) inode=15414 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=10 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PATH item=11 name=(null) inode=15415 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:23:04.031000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 00:23:04.606234 systemd-networkd[1181]: lo: Link UP Sep 6 00:23:04.607572 systemd-networkd[1181]: lo: Gained carrier Sep 6 00:23:04.608265 systemd-networkd[1181]: Enumeration completed Sep 6 00:23:04.609518 systemd[1]: Started systemd-networkd.service. Sep 6 00:23:04.611067 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Sep 6 00:23:04.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:04.613923 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:23:04.634185 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:23:04.646740 systemd-networkd[1181]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:23:04.685401 systemd[1]: Finished systemd-udev-settle.service. Sep 6 00:23:04.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:04.690194 systemd[1]: Starting lvm2-activation-early.service... Sep 6 00:23:04.700985 kernel: mlx5_core dffe:00:02.0 enP57342s1: Link up Sep 6 00:23:04.722994 kernel: hv_netvsc 7c1e52fb-312f-7c1e-52fb-312f7c1e52fb eth0: Data path switched to VF: enP57342s1 Sep 6 00:23:04.723743 systemd-networkd[1181]: enP57342s1: Link UP Sep 6 00:23:04.723865 systemd-networkd[1181]: eth0: Link UP Sep 6 00:23:04.723870 systemd-networkd[1181]: eth0: Gained carrier Sep 6 00:23:04.728284 systemd-networkd[1181]: enP57342s1: Gained carrier Sep 6 00:23:04.765125 systemd-networkd[1181]: eth0: DHCPv4 address 10.200.8.21/24, gateway 10.200.8.1 acquired from 168.63.129.16 Sep 6 00:23:04.982554 lvm[1245]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:23:05.012114 systemd[1]: Finished lvm2-activation-early.service. Sep 6 00:23:05.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.015615 systemd[1]: Reached target cryptsetup.target. Sep 6 00:23:05.019536 systemd[1]: Starting lvm2-activation.service... Sep 6 00:23:05.024390 lvm[1246]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:23:05.043138 systemd[1]: Finished lvm2-activation.service. Sep 6 00:23:05.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.046332 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:23:05.049076 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 00:23:05.049111 systemd[1]: Reached target local-fs.target. Sep 6 00:23:05.051405 systemd[1]: Reached target machines.target. Sep 6 00:23:05.055096 systemd[1]: Starting ldconfig.service... Sep 6 00:23:05.057437 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.057548 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:05.058885 systemd[1]: Starting systemd-boot-update.service... Sep 6 00:23:05.062732 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 00:23:05.067669 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 00:23:05.071660 systemd[1]: Starting systemd-sysext.service... Sep 6 00:23:05.159673 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1248 (bootctl) Sep 6 00:23:05.161490 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 00:23:05.294320 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 00:23:05.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.303519 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 00:23:05.315564 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 00:23:05.315731 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 00:23:05.344989 kernel: loop0: detected capacity change from 0 to 229808 Sep 6 00:23:05.389987 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 00:23:05.394830 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 00:23:05.395441 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 00:23:05.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.408983 kernel: loop1: detected capacity change from 0 to 229808 Sep 6 00:23:05.415793 (sd-sysext)[1260]: Using extensions 'kubernetes'. Sep 6 00:23:05.416298 (sd-sysext)[1260]: Merged extensions into '/usr'. Sep 6 00:23:05.432661 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:05.434244 systemd[1]: Mounting usr-share-oem.mount... Sep 6 00:23:05.436006 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.437695 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:05.441231 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:05.443649 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:05.444716 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.444880 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:05.445042 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:05.449209 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:05.449396 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:05.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.452455 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:05.452612 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:05.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.454244 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:05.454358 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:05.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.455209 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:05.455304 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.459535 systemd[1]: Mounted usr-share-oem.mount. Sep 6 00:23:05.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.461618 systemd[1]: Finished systemd-sysext.service. Sep 6 00:23:05.464812 systemd[1]: Starting ensure-sysext.service... Sep 6 00:23:05.467088 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 00:23:05.476820 systemd[1]: Reloading. Sep 6 00:23:05.531783 /usr/lib/systemd/system-generators/torcx-generator[1287]: time="2025-09-06T00:23:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:23:05.532322 /usr/lib/systemd/system-generators/torcx-generator[1287]: time="2025-09-06T00:23:05Z" level=info msg="torcx already run" Sep 6 00:23:05.616919 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 00:23:05.639590 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:23:05.639612 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:23:05.656333 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:23:05.725000 audit: BPF prog-id=27 op=LOAD Sep 6 00:23:05.725000 audit: BPF prog-id=18 op=UNLOAD Sep 6 00:23:05.726000 audit: BPF prog-id=28 op=LOAD Sep 6 00:23:05.726000 audit: BPF prog-id=29 op=LOAD Sep 6 00:23:05.726000 audit: BPF prog-id=19 op=UNLOAD Sep 6 00:23:05.726000 audit: BPF prog-id=20 op=UNLOAD Sep 6 00:23:05.727357 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 00:23:05.727000 audit: BPF prog-id=30 op=LOAD Sep 6 00:23:05.727000 audit: BPF prog-id=31 op=LOAD Sep 6 00:23:05.727000 audit: BPF prog-id=21 op=UNLOAD Sep 6 00:23:05.727000 audit: BPF prog-id=22 op=UNLOAD Sep 6 00:23:05.729000 audit: BPF prog-id=32 op=LOAD Sep 6 00:23:05.729000 audit: BPF prog-id=23 op=UNLOAD Sep 6 00:23:05.730000 audit: BPF prog-id=33 op=LOAD Sep 6 00:23:05.730000 audit: BPF prog-id=24 op=UNLOAD Sep 6 00:23:05.730000 audit: BPF prog-id=34 op=LOAD Sep 6 00:23:05.730000 audit: BPF prog-id=35 op=LOAD Sep 6 00:23:05.730000 audit: BPF prog-id=25 op=UNLOAD Sep 6 00:23:05.730000 audit: BPF prog-id=26 op=UNLOAD Sep 6 00:23:05.744407 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:05.744692 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.746272 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:23:05.749281 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:23:05.753096 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:05.754313 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.754433 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:05.754544 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:05.755452 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:05.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.755622 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:05.761626 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:23:05.761805 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:23:05.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.763692 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:23:05.763815 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:23:05.765684 systemd[1]: Finished ensure-sysext.service. Sep 6 00:23:05.767016 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:05.767250 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.769665 systemd[1]: Starting modprobe@drm.service... Sep 6 00:23:05.772268 systemd[1]: Starting modprobe@loop.service... Sep 6 00:23:05.773879 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.773970 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:05.774059 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:23:05.774150 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:23:05.777523 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:23:05.777712 systemd[1]: Finished modprobe@drm.service. Sep 6 00:23:05.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.779752 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:23:05.779867 systemd[1]: Finished modprobe@loop.service. Sep 6 00:23:05.780084 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:23:05.837455 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 00:23:05.915523 systemd-fsck[1256]: fsck.fat 4.2 (2021-01-31) Sep 6 00:23:05.915523 systemd-fsck[1256]: /dev/sda1: 790 files, 120761/258078 clusters Sep 6 00:23:05.919038 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 00:23:05.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:05.924753 systemd[1]: Mounting boot.mount... Sep 6 00:23:05.937343 systemd[1]: Mounted boot.mount. Sep 6 00:23:05.951439 systemd[1]: Finished systemd-boot-update.service. Sep 6 00:23:05.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.492140 systemd-networkd[1181]: eth0: Gained IPv6LL Sep 6 00:23:06.497937 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:23:06.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.504412 kernel: kauditd_printk_skb: 115 callbacks suppressed Sep 6 00:23:06.504464 kernel: audit: type=1130 audit(1757118186.500:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.686099 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 00:23:06.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.690507 systemd[1]: Starting audit-rules.service... Sep 6 00:23:06.702242 kernel: audit: type=1130 audit(1757118186.688:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.705434 systemd[1]: Starting clean-ca-certificates.service... Sep 6 00:23:06.709675 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 00:23:06.719076 kernel: audit: type=1334 audit(1757118186.713:198): prog-id=36 op=LOAD Sep 6 00:23:06.713000 audit: BPF prog-id=36 op=LOAD Sep 6 00:23:06.715343 systemd[1]: Starting systemd-resolved.service... Sep 6 00:23:06.727257 kernel: audit: type=1334 audit(1757118186.721:199): prog-id=37 op=LOAD Sep 6 00:23:06.721000 audit: BPF prog-id=37 op=LOAD Sep 6 00:23:06.723374 systemd[1]: Starting systemd-timesyncd.service... Sep 6 00:23:06.730533 systemd[1]: Starting systemd-update-utmp.service... Sep 6 00:23:06.737000 audit[1370]: SYSTEM_BOOT pid=1370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.745977 systemd[1]: Finished systemd-update-utmp.service. Sep 6 00:23:06.753835 kernel: audit: type=1127 audit(1757118186.737:200): pid=1370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.769168 kernel: audit: type=1130 audit(1757118186.753:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.805244 systemd[1]: Finished clean-ca-certificates.service. Sep 6 00:23:06.824141 kernel: audit: type=1130 audit(1757118186.807:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.808424 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:23:06.870553 systemd[1]: Started systemd-timesyncd.service. Sep 6 00:23:06.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.873839 systemd[1]: Reached target time-set.target. Sep 6 00:23:06.890816 kernel: audit: type=1130 audit(1757118186.872:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.913528 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 00:23:06.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.937028 kernel: audit: type=1130 audit(1757118186.916:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:06.937298 systemd-resolved[1363]: Positive Trust Anchors: Sep 6 00:23:06.937313 systemd-resolved[1363]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:23:06.937352 systemd-resolved[1363]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:23:07.022817 systemd-timesyncd[1366]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Sep 6 00:23:07.022989 systemd-timesyncd[1366]: Initial clock synchronization to Sat 2025-09-06 00:23:07.023598 UTC. Sep 6 00:23:07.039140 systemd-resolved[1363]: Using system hostname 'ci-3510.3.8-n-0e63f2a0ae'. Sep 6 00:23:07.040895 systemd[1]: Started systemd-resolved.service. Sep 6 00:23:07.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:07.043844 systemd[1]: Reached target network.target. Sep 6 00:23:07.065129 kernel: audit: type=1130 audit(1757118187.043:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:07.065190 systemd[1]: Reached target network-online.target. Sep 6 00:23:07.067746 systemd[1]: Reached target nss-lookup.target. Sep 6 00:23:07.144000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 00:23:07.144000 audit[1380]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9d678a50 a2=420 a3=0 items=0 ppid=1359 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:07.144000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 00:23:07.146104 augenrules[1380]: No rules Sep 6 00:23:07.146622 systemd[1]: Finished audit-rules.service. Sep 6 00:23:12.320897 ldconfig[1247]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 00:23:12.334141 systemd[1]: Finished ldconfig.service. Sep 6 00:23:12.338330 systemd[1]: Starting systemd-update-done.service... Sep 6 00:23:12.364511 systemd[1]: Finished systemd-update-done.service. Sep 6 00:23:12.367383 systemd[1]: Reached target sysinit.target. Sep 6 00:23:12.369571 systemd[1]: Started motdgen.path. Sep 6 00:23:12.371927 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 00:23:12.375130 systemd[1]: Started logrotate.timer. Sep 6 00:23:12.377168 systemd[1]: Started mdadm.timer. Sep 6 00:23:12.379021 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 00:23:12.381514 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 00:23:12.381540 systemd[1]: Reached target paths.target. Sep 6 00:23:12.383581 systemd[1]: Reached target timers.target. Sep 6 00:23:12.386105 systemd[1]: Listening on dbus.socket. Sep 6 00:23:12.389276 systemd[1]: Starting docker.socket... Sep 6 00:23:12.422616 systemd[1]: Listening on sshd.socket. Sep 6 00:23:12.424930 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:12.425426 systemd[1]: Listening on docker.socket. Sep 6 00:23:12.427564 systemd[1]: Reached target sockets.target. Sep 6 00:23:12.429780 systemd[1]: Reached target basic.target. Sep 6 00:23:12.431908 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:23:12.431930 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:23:12.433040 systemd[1]: Starting containerd.service... Sep 6 00:23:12.436628 systemd[1]: Starting dbus.service... Sep 6 00:23:12.439957 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 00:23:12.443778 systemd[1]: Starting extend-filesystems.service... Sep 6 00:23:12.446192 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 00:23:12.463254 systemd[1]: Starting kubelet.service... Sep 6 00:23:12.466803 systemd[1]: Starting motdgen.service... Sep 6 00:23:12.470278 systemd[1]: Started nvidia.service. Sep 6 00:23:12.474775 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 00:23:12.478706 systemd[1]: Starting sshd-keygen.service... Sep 6 00:23:12.488429 systemd[1]: Starting systemd-logind.service... Sep 6 00:23:12.490804 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:23:12.490897 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 00:23:12.491862 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 00:23:12.493002 systemd[1]: Starting update-engine.service... Sep 6 00:23:12.496529 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 00:23:12.520703 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 00:23:12.520910 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 00:23:12.541718 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 00:23:12.541992 systemd[1]: Finished motdgen.service. Sep 6 00:23:12.561657 jq[1390]: false Sep 6 00:23:12.562661 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 00:23:12.562996 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 00:23:12.563604 jq[1403]: true Sep 6 00:23:12.572004 extend-filesystems[1391]: Found loop1 Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda1 Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda2 Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda3 Sep 6 00:23:12.572004 extend-filesystems[1391]: Found usr Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda4 Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda6 Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda7 Sep 6 00:23:12.572004 extend-filesystems[1391]: Found sda9 Sep 6 00:23:12.596665 extend-filesystems[1391]: Checking size of /dev/sda9 Sep 6 00:23:12.604704 jq[1419]: true Sep 6 00:23:12.614381 env[1411]: time="2025-09-06T00:23:12.614331967Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 00:23:12.659152 env[1411]: time="2025-09-06T00:23:12.659096613Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 00:23:12.662890 systemd-logind[1401]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 00:23:12.672352 extend-filesystems[1391]: Old size kept for /dev/sda9 Sep 6 00:23:12.676729 extend-filesystems[1391]: Found sr0 Sep 6 00:23:12.680067 systemd-logind[1401]: New seat seat0. Sep 6 00:23:12.682989 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 00:23:12.683226 systemd[1]: Finished extend-filesystems.service. Sep 6 00:23:12.687574 env[1411]: time="2025-09-06T00:23:12.687524550Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:12.690445 env[1411]: time="2025-09-06T00:23:12.690407175Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:23:12.693097 env[1411]: time="2025-09-06T00:23:12.693061590Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:12.694247 env[1411]: time="2025-09-06T00:23:12.694218841Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:23:12.694373 env[1411]: time="2025-09-06T00:23:12.694356847Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:12.694459 env[1411]: time="2025-09-06T00:23:12.694442950Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 00:23:12.694537 env[1411]: time="2025-09-06T00:23:12.694522954Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:12.694694 env[1411]: time="2025-09-06T00:23:12.694678061Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:12.695090 env[1411]: time="2025-09-06T00:23:12.695062477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:23:12.695401 env[1411]: time="2025-09-06T00:23:12.695375591Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:23:12.695581 env[1411]: time="2025-09-06T00:23:12.695564499Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 00:23:12.695782 env[1411]: time="2025-09-06T00:23:12.695755508Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 00:23:12.695866 env[1411]: time="2025-09-06T00:23:12.695852812Z" level=info msg="metadata content store policy set" policy=shared Sep 6 00:23:12.709509 env[1411]: time="2025-09-06T00:23:12.709473004Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 00:23:12.709597 env[1411]: time="2025-09-06T00:23:12.709518506Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 00:23:12.709597 env[1411]: time="2025-09-06T00:23:12.709536307Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 00:23:12.709597 env[1411]: time="2025-09-06T00:23:12.709588909Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709709 env[1411]: time="2025-09-06T00:23:12.709610510Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709709 env[1411]: time="2025-09-06T00:23:12.709631711Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709709 env[1411]: time="2025-09-06T00:23:12.709649812Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709709 env[1411]: time="2025-09-06T00:23:12.709671413Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709709 env[1411]: time="2025-09-06T00:23:12.709689714Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709881 env[1411]: time="2025-09-06T00:23:12.709709214Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709881 env[1411]: time="2025-09-06T00:23:12.709728415Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.709881 env[1411]: time="2025-09-06T00:23:12.709748916Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 00:23:12.709881 env[1411]: time="2025-09-06T00:23:12.709863421Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 00:23:12.710068 env[1411]: time="2025-09-06T00:23:12.709990827Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 00:23:12.712593 env[1411]: time="2025-09-06T00:23:12.712561238Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 00:23:12.712662 env[1411]: time="2025-09-06T00:23:12.712608740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712662 env[1411]: time="2025-09-06T00:23:12.712632241Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 00:23:12.712735 env[1411]: time="2025-09-06T00:23:12.712700344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712735 env[1411]: time="2025-09-06T00:23:12.712720245Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712811 env[1411]: time="2025-09-06T00:23:12.712738346Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712858 env[1411]: time="2025-09-06T00:23:12.712817950Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712858 env[1411]: time="2025-09-06T00:23:12.712837350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712929 env[1411]: time="2025-09-06T00:23:12.712860251Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712929 env[1411]: time="2025-09-06T00:23:12.712877852Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712929 env[1411]: time="2025-09-06T00:23:12.712895353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.712929 env[1411]: time="2025-09-06T00:23:12.712916254Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 00:23:12.715846 env[1411]: time="2025-09-06T00:23:12.715812980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.715924 env[1411]: time="2025-09-06T00:23:12.715850681Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.715924 env[1411]: time="2025-09-06T00:23:12.715870582Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.715924 env[1411]: time="2025-09-06T00:23:12.715888483Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 00:23:12.715924 env[1411]: time="2025-09-06T00:23:12.715913284Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 00:23:12.716095 env[1411]: time="2025-09-06T00:23:12.715929585Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 00:23:12.716095 env[1411]: time="2025-09-06T00:23:12.715955886Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 00:23:12.716095 env[1411]: time="2025-09-06T00:23:12.716012588Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 00:23:12.716359 env[1411]: time="2025-09-06T00:23:12.716287600Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.716404005Z" level=info msg="Connect containerd service" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.716455908Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.722119054Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.722441768Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.722497170Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.730339011Z" level=info msg="Start subscribing containerd event" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.730408714Z" level=info msg="Start recovering state" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.730480018Z" level=info msg="Start event monitor" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.730502619Z" level=info msg="Start snapshots syncer" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.730515519Z" level=info msg="Start cni network conf syncer for default" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.730525620Z" level=info msg="Start streaming server" Sep 6 00:23:12.750762 env[1411]: time="2025-09-06T00:23:12.737023002Z" level=info msg="containerd successfully booted in 0.124015s" Sep 6 00:23:12.722622 systemd[1]: Started containerd.service. Sep 6 00:23:12.800315 systemd[1]: nvidia.service: Deactivated successfully. Sep 6 00:23:12.850084 bash[1443]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:23:12.850698 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 00:23:12.900686 dbus-daemon[1389]: [system] SELinux support is enabled Sep 6 00:23:12.901247 systemd[1]: Started dbus.service. Sep 6 00:23:12.906354 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 00:23:12.906388 systemd[1]: Reached target system-config.target. Sep 6 00:23:12.909251 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 00:23:12.909272 systemd[1]: Reached target user-config.target. Sep 6 00:23:12.916398 systemd[1]: Started systemd-logind.service. Sep 6 00:23:12.925123 dbus-daemon[1389]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 6 00:23:13.442587 update_engine[1402]: I0906 00:23:13.441780 1402 main.cc:92] Flatcar Update Engine starting Sep 6 00:23:13.495083 systemd[1]: Started update-engine.service. Sep 6 00:23:13.504144 update_engine[1402]: I0906 00:23:13.495151 1402 update_check_scheduler.cc:74] Next update check in 6m3s Sep 6 00:23:13.500722 systemd[1]: Started locksmithd.service. Sep 6 00:23:13.986460 systemd[1]: Started kubelet.service. Sep 6 00:23:14.726981 kubelet[1500]: E0906 00:23:14.726909 1500 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:23:14.729597 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:23:14.729758 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:23:14.730091 systemd[1]: kubelet.service: Consumed 1.184s CPU time. Sep 6 00:23:14.898334 locksmithd[1493]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 00:23:15.373380 sshd_keygen[1410]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 00:23:15.394478 systemd[1]: Finished sshd-keygen.service. Sep 6 00:23:15.398905 systemd[1]: Starting issuegen.service... Sep 6 00:23:15.402774 systemd[1]: Started waagent.service. Sep 6 00:23:15.410326 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 00:23:15.410515 systemd[1]: Finished issuegen.service. Sep 6 00:23:15.414333 systemd[1]: Starting systemd-user-sessions.service... Sep 6 00:23:15.437582 systemd[1]: Finished systemd-user-sessions.service. Sep 6 00:23:15.442682 systemd[1]: Started getty@tty1.service. Sep 6 00:23:15.446835 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 00:23:15.449711 systemd[1]: Reached target getty.target. Sep 6 00:23:15.452242 systemd[1]: Reached target multi-user.target. Sep 6 00:23:15.456426 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 00:23:15.472269 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 00:23:15.472466 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 00:23:15.475932 systemd[1]: Startup finished in 1.041s (kernel) + 12.990s (initrd) + 25.535s (userspace) = 39.566s. Sep 6 00:23:15.853467 login[1519]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Sep 6 00:23:15.855651 login[1520]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 6 00:23:15.887805 systemd[1]: Created slice user-500.slice. Sep 6 00:23:15.889506 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 00:23:15.893727 systemd-logind[1401]: New session 2 of user core. Sep 6 00:23:15.900958 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 00:23:15.903263 systemd[1]: Starting user@500.service... Sep 6 00:23:15.906827 (systemd)[1523]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:16.036380 systemd[1523]: Queued start job for default target default.target. Sep 6 00:23:16.037092 systemd[1523]: Reached target paths.target. Sep 6 00:23:16.037122 systemd[1523]: Reached target sockets.target. Sep 6 00:23:16.037138 systemd[1523]: Reached target timers.target. Sep 6 00:23:16.037154 systemd[1523]: Reached target basic.target. Sep 6 00:23:16.037289 systemd[1]: Started user@500.service. Sep 6 00:23:16.038653 systemd[1]: Started session-2.scope. Sep 6 00:23:16.039540 systemd[1523]: Reached target default.target. Sep 6 00:23:16.039754 systemd[1523]: Startup finished in 126ms. Sep 6 00:23:16.853934 login[1519]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 6 00:23:16.858029 systemd-logind[1401]: New session 1 of user core. Sep 6 00:23:16.859306 systemd[1]: Started session-1.scope. Sep 6 00:23:22.034882 waagent[1514]: 2025-09-06T00:23:22.034752Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 6 00:23:22.039302 waagent[1514]: 2025-09-06T00:23:22.039208Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 6 00:23:22.042134 waagent[1514]: 2025-09-06T00:23:22.042065Z INFO Daemon Daemon Python: 3.9.16 Sep 6 00:23:22.045520 waagent[1514]: 2025-09-06T00:23:22.045435Z INFO Daemon Daemon Run daemon Sep 6 00:23:22.051706 waagent[1514]: 2025-09-06T00:23:22.051630Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 6 00:23:22.064792 waagent[1514]: 2025-09-06T00:23:22.064644Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 6 00:23:22.076698 waagent[1514]: 2025-09-06T00:23:22.076557Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 6 00:23:22.082809 waagent[1514]: 2025-09-06T00:23:22.082718Z INFO Daemon Daemon cloud-init is enabled: False Sep 6 00:23:22.094889 waagent[1514]: 2025-09-06T00:23:22.084593Z INFO Daemon Daemon Using waagent for provisioning Sep 6 00:23:22.094889 waagent[1514]: 2025-09-06T00:23:22.087187Z INFO Daemon Daemon Activate resource disk Sep 6 00:23:22.094889 waagent[1514]: 2025-09-06T00:23:22.089084Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 6 00:23:22.096933 waagent[1514]: 2025-09-06T00:23:22.096865Z INFO Daemon Daemon Found device: None Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.098467Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.099419Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.101305Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.102549Z INFO Daemon Daemon Running default provisioning handler Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.113131Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.116301Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.117186Z INFO Daemon Daemon cloud-init is enabled: False Sep 6 00:23:22.130379 waagent[1514]: 2025-09-06T00:23:22.118227Z INFO Daemon Daemon Copying ovf-env.xml Sep 6 00:23:22.186110 waagent[1514]: 2025-09-06T00:23:22.181748Z INFO Daemon Daemon Successfully mounted dvd Sep 6 00:23:22.218204 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 6 00:23:22.271230 waagent[1514]: 2025-09-06T00:23:22.271068Z INFO Daemon Daemon Detect protocol endpoint Sep 6 00:23:22.289049 waagent[1514]: 2025-09-06T00:23:22.272726Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 6 00:23:22.289049 waagent[1514]: 2025-09-06T00:23:22.273817Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 6 00:23:22.289049 waagent[1514]: 2025-09-06T00:23:22.275395Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 6 00:23:22.289049 waagent[1514]: 2025-09-06T00:23:22.276698Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 6 00:23:22.289049 waagent[1514]: 2025-09-06T00:23:22.277548Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 6 00:23:22.400336 waagent[1514]: 2025-09-06T00:23:22.400259Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 6 00:23:22.404880 waagent[1514]: 2025-09-06T00:23:22.404824Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 6 00:23:22.408122 waagent[1514]: 2025-09-06T00:23:22.408056Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 6 00:23:23.138625 waagent[1514]: 2025-09-06T00:23:23.138452Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 6 00:23:23.151230 waagent[1514]: 2025-09-06T00:23:23.151146Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 6 00:23:23.154958 waagent[1514]: 2025-09-06T00:23:23.154877Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 6 00:23:23.225885 waagent[1514]: 2025-09-06T00:23:23.225742Z INFO Daemon Daemon Found private key matching thumbprint 2F1AF34B4ABC9CD59D1869880274742EEB9D609D Sep 6 00:23:23.233342 waagent[1514]: 2025-09-06T00:23:23.227829Z INFO Daemon Daemon Fetch goal state completed Sep 6 00:23:23.271504 waagent[1514]: 2025-09-06T00:23:23.271424Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 7c28a43b-5dee-458d-b8f0-fd408e0a1115 New eTag: 13125978565743923905] Sep 6 00:23:23.280568 waagent[1514]: 2025-09-06T00:23:23.273328Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 6 00:23:23.286393 waagent[1514]: 2025-09-06T00:23:23.286333Z INFO Daemon Daemon Starting provisioning Sep 6 00:23:23.294573 waagent[1514]: 2025-09-06T00:23:23.287802Z INFO Daemon Daemon Handle ovf-env.xml. Sep 6 00:23:23.294573 waagent[1514]: 2025-09-06T00:23:23.288885Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-0e63f2a0ae] Sep 6 00:23:23.309606 waagent[1514]: 2025-09-06T00:23:23.309458Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-0e63f2a0ae] Sep 6 00:23:23.324507 waagent[1514]: 2025-09-06T00:23:23.316910Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 6 00:23:23.324507 waagent[1514]: 2025-09-06T00:23:23.317887Z INFO Daemon Daemon Primary interface is [eth0] Sep 6 00:23:23.332232 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 6 00:23:23.332495 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 6 00:23:23.332579 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 6 00:23:23.332947 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:23:23.339012 systemd-networkd[1181]: eth0: DHCPv6 lease lost Sep 6 00:23:23.340520 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:23:23.340741 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:23:23.343242 systemd[1]: Starting systemd-networkd.service... Sep 6 00:23:23.376303 systemd-networkd[1567]: enP57342s1: Link UP Sep 6 00:23:23.376314 systemd-networkd[1567]: enP57342s1: Gained carrier Sep 6 00:23:23.377694 systemd-networkd[1567]: eth0: Link UP Sep 6 00:23:23.377704 systemd-networkd[1567]: eth0: Gained carrier Sep 6 00:23:23.378329 systemd-networkd[1567]: lo: Link UP Sep 6 00:23:23.378405 systemd-networkd[1567]: lo: Gained carrier Sep 6 00:23:23.378731 systemd-networkd[1567]: eth0: Gained IPv6LL Sep 6 00:23:23.379049 systemd-networkd[1567]: Enumeration completed Sep 6 00:23:23.379164 systemd[1]: Started systemd-networkd.service. Sep 6 00:23:23.384872 waagent[1514]: 2025-09-06T00:23:23.381058Z INFO Daemon Daemon Create user account if not exists Sep 6 00:23:23.384872 waagent[1514]: 2025-09-06T00:23:23.382895Z INFO Daemon Daemon User core already exists, skip useradd Sep 6 00:23:23.384872 waagent[1514]: 2025-09-06T00:23:23.383745Z INFO Daemon Daemon Configure sudoer Sep 6 00:23:23.381608 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:23:23.385573 waagent[1514]: 2025-09-06T00:23:23.385515Z INFO Daemon Daemon Configure sshd Sep 6 00:23:23.386708 waagent[1514]: 2025-09-06T00:23:23.386659Z INFO Daemon Daemon Deploy ssh public key. Sep 6 00:23:23.391262 systemd-networkd[1567]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:23:23.437070 systemd-networkd[1567]: eth0: DHCPv4 address 10.200.8.21/24, gateway 10.200.8.1 acquired from 168.63.129.16 Sep 6 00:23:23.440122 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:23:24.495799 waagent[1514]: 2025-09-06T00:23:24.495689Z INFO Daemon Daemon Provisioning complete Sep 6 00:23:24.511230 waagent[1514]: 2025-09-06T00:23:24.511149Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 6 00:23:24.515234 waagent[1514]: 2025-09-06T00:23:24.515154Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 6 00:23:24.521752 waagent[1514]: 2025-09-06T00:23:24.521678Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 6 00:23:24.794492 waagent[1573]: 2025-09-06T00:23:24.794303Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 6 00:23:24.795264 waagent[1573]: 2025-09-06T00:23:24.795190Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:23:24.795422 waagent[1573]: 2025-09-06T00:23:24.795365Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:23:24.806625 waagent[1573]: 2025-09-06T00:23:24.806543Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 6 00:23:24.806810 waagent[1573]: 2025-09-06T00:23:24.806754Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 6 00:23:24.860382 waagent[1573]: 2025-09-06T00:23:24.860239Z INFO ExtHandler ExtHandler Found private key matching thumbprint 2F1AF34B4ABC9CD59D1869880274742EEB9D609D Sep 6 00:23:24.860714 waagent[1573]: 2025-09-06T00:23:24.860646Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 6 00:23:24.874709 waagent[1573]: 2025-09-06T00:23:24.874642Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: a1b33f41-d286-4133-b903-018b1b42abd9 New eTag: 13125978565743923905] Sep 6 00:23:24.875264 waagent[1573]: 2025-09-06T00:23:24.875202Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 6 00:23:24.956721 waagent[1573]: 2025-09-06T00:23:24.956560Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 6 00:23:24.965757 waagent[1573]: 2025-09-06T00:23:24.965667Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1573 Sep 6 00:23:24.969284 waagent[1573]: 2025-09-06T00:23:24.969212Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 6 00:23:24.970483 waagent[1573]: 2025-09-06T00:23:24.970417Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 6 00:23:24.980740 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 00:23:24.981062 systemd[1]: Stopped kubelet.service. Sep 6 00:23:24.981116 systemd[1]: kubelet.service: Consumed 1.184s CPU time. Sep 6 00:23:24.982837 systemd[1]: Starting kubelet.service... Sep 6 00:23:25.719122 waagent[1573]: 2025-09-06T00:23:25.719049Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 6 00:23:25.719583 waagent[1573]: 2025-09-06T00:23:25.719511Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 6 00:23:25.728477 waagent[1573]: 2025-09-06T00:23:25.728413Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 6 00:23:25.729013 waagent[1573]: 2025-09-06T00:23:25.728929Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 6 00:23:25.730149 waagent[1573]: 2025-09-06T00:23:25.730085Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 6 00:23:25.731612 waagent[1573]: 2025-09-06T00:23:25.731550Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 6 00:23:25.732429 waagent[1573]: 2025-09-06T00:23:25.732369Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 6 00:23:25.732700 waagent[1573]: 2025-09-06T00:23:25.732629Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:23:25.732803 waagent[1573]: 2025-09-06T00:23:25.732744Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:23:25.733174 waagent[1573]: 2025-09-06T00:23:25.733120Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:23:25.733485 waagent[1573]: 2025-09-06T00:23:25.733433Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:23:25.734792 waagent[1573]: 2025-09-06T00:23:25.734734Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 6 00:23:25.735384 waagent[1573]: 2025-09-06T00:23:25.735327Z INFO EnvHandler ExtHandler Configure routes Sep 6 00:23:25.735809 waagent[1573]: 2025-09-06T00:23:25.735752Z INFO EnvHandler ExtHandler Gateway:None Sep 6 00:23:25.736017 waagent[1573]: 2025-09-06T00:23:25.735942Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 6 00:23:25.736197 waagent[1573]: 2025-09-06T00:23:25.736141Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 6 00:23:25.736197 waagent[1573]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 6 00:23:25.736197 waagent[1573]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Sep 6 00:23:25.736197 waagent[1573]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 6 00:23:25.736197 waagent[1573]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:23:25.736197 waagent[1573]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:23:25.736197 waagent[1573]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:23:25.736657 waagent[1573]: 2025-09-06T00:23:25.736602Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 6 00:23:25.740306 waagent[1573]: 2025-09-06T00:23:25.740240Z INFO EnvHandler ExtHandler Routes:None Sep 6 00:23:25.741039 waagent[1573]: 2025-09-06T00:23:25.739810Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 6 00:23:25.741298 waagent[1573]: 2025-09-06T00:23:25.741239Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 6 00:23:25.742323 waagent[1573]: 2025-09-06T00:23:25.742212Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 6 00:23:25.755737 waagent[1573]: 2025-09-06T00:23:25.755666Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 6 00:23:25.756532 waagent[1573]: 2025-09-06T00:23:25.756488Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 6 00:23:25.757501 waagent[1573]: 2025-09-06T00:23:25.757452Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 6 00:23:25.781715 waagent[1573]: 2025-09-06T00:23:25.781591Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1567' Sep 6 00:23:25.793822 waagent[1573]: 2025-09-06T00:23:25.793754Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 6 00:23:25.849047 systemd[1]: Started kubelet.service. Sep 6 00:23:25.904196 kubelet[1603]: E0906 00:23:25.904138 1603 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:23:25.907383 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:23:25.907553 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:23:25.925131 waagent[1573]: 2025-09-06T00:23:25.924646Z INFO MonitorHandler ExtHandler Network interfaces: Sep 6 00:23:25.925131 waagent[1573]: Executing ['ip', '-a', '-o', 'link']: Sep 6 00:23:25.925131 waagent[1573]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 6 00:23:25.925131 waagent[1573]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:fb:31:2f brd ff:ff:ff:ff:ff:ff Sep 6 00:23:25.925131 waagent[1573]: 3: enP57342s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:fb:31:2f brd ff:ff:ff:ff:ff:ff\ altname enP57342p0s2 Sep 6 00:23:25.925131 waagent[1573]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 6 00:23:25.925131 waagent[1573]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 6 00:23:25.925131 waagent[1573]: 2: eth0 inet 10.200.8.21/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 6 00:23:25.925131 waagent[1573]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 6 00:23:25.925131 waagent[1573]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 6 00:23:25.925131 waagent[1573]: 2: eth0 inet6 fe80::7e1e:52ff:fefb:312f/64 scope link \ valid_lft forever preferred_lft forever Sep 6 00:23:26.142282 waagent[1573]: 2025-09-06T00:23:26.142131Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 6 00:23:26.526810 waagent[1514]: 2025-09-06T00:23:26.526572Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 6 00:23:26.531854 waagent[1514]: 2025-09-06T00:23:26.531792Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 6 00:23:27.601659 waagent[1618]: 2025-09-06T00:23:27.601544Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 6 00:23:27.602435 waagent[1618]: 2025-09-06T00:23:27.602364Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 6 00:23:27.602614 waagent[1618]: 2025-09-06T00:23:27.602555Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 6 00:23:27.602783 waagent[1618]: 2025-09-06T00:23:27.602733Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Sep 6 00:23:27.619099 waagent[1618]: 2025-09-06T00:23:27.618944Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 6 00:23:27.619591 waagent[1618]: 2025-09-06T00:23:27.619517Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:23:27.619786 waagent[1618]: 2025-09-06T00:23:27.619731Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:23:27.620058 waagent[1618]: 2025-09-06T00:23:27.620004Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 6 00:23:27.632110 waagent[1618]: 2025-09-06T00:23:27.632041Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 6 00:23:27.640220 waagent[1618]: 2025-09-06T00:23:27.640159Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.175 Sep 6 00:23:27.641189 waagent[1618]: 2025-09-06T00:23:27.641129Z INFO ExtHandler Sep 6 00:23:27.641359 waagent[1618]: 2025-09-06T00:23:27.641307Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 3dd65f8d-9ecd-457e-9697-9bd90c8b9ce9 eTag: 13125978565743923905 source: Fabric] Sep 6 00:23:27.642096 waagent[1618]: 2025-09-06T00:23:27.642040Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 6 00:23:27.643243 waagent[1618]: 2025-09-06T00:23:27.643181Z INFO ExtHandler Sep 6 00:23:27.643396 waagent[1618]: 2025-09-06T00:23:27.643345Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 6 00:23:27.650241 waagent[1618]: 2025-09-06T00:23:27.650186Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 6 00:23:27.650718 waagent[1618]: 2025-09-06T00:23:27.650667Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 6 00:23:27.672312 waagent[1618]: 2025-09-06T00:23:27.672241Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 6 00:23:27.727388 waagent[1618]: 2025-09-06T00:23:27.727261Z INFO ExtHandler Downloaded certificate {'thumbprint': '2F1AF34B4ABC9CD59D1869880274742EEB9D609D', 'hasPrivateKey': True} Sep 6 00:23:27.728654 waagent[1618]: 2025-09-06T00:23:27.728580Z INFO ExtHandler Fetch goal state from WireServer completed Sep 6 00:23:27.729506 waagent[1618]: 2025-09-06T00:23:27.729443Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 6 00:23:27.746614 waagent[1618]: 2025-09-06T00:23:27.746507Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 6 00:23:27.754985 waagent[1618]: 2025-09-06T00:23:27.754868Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 6 00:23:27.758703 waagent[1618]: 2025-09-06T00:23:27.758608Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 6 00:23:27.758927 waagent[1618]: 2025-09-06T00:23:27.758873Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 6 00:23:27.986063 waagent[1618]: 2025-09-06T00:23:27.985830Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: Sep 6 00:23:27.986063 waagent[1618]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:27.986063 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:27.986063 waagent[1618]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:27.986063 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:27.986063 waagent[1618]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:27.986063 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:27.986063 waagent[1618]: 54 7806 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 00:23:27.987215 waagent[1618]: 2025-09-06T00:23:27.987143Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 6 00:23:27.990016 waagent[1618]: 2025-09-06T00:23:27.989891Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 6 00:23:27.990287 waagent[1618]: 2025-09-06T00:23:27.990234Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 6 00:23:27.990658 waagent[1618]: 2025-09-06T00:23:27.990601Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 6 00:23:27.999626 waagent[1618]: 2025-09-06T00:23:27.999562Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 6 00:23:28.000190 waagent[1618]: 2025-09-06T00:23:28.000131Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 6 00:23:28.007775 waagent[1618]: 2025-09-06T00:23:28.007711Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1618 Sep 6 00:23:28.010890 waagent[1618]: 2025-09-06T00:23:28.010825Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 6 00:23:28.011695 waagent[1618]: 2025-09-06T00:23:28.011634Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 6 00:23:28.012572 waagent[1618]: 2025-09-06T00:23:28.012508Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 6 00:23:28.015093 waagent[1618]: 2025-09-06T00:23:28.015035Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 6 00:23:28.015438 waagent[1618]: 2025-09-06T00:23:28.015380Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 6 00:23:28.016745 waagent[1618]: 2025-09-06T00:23:28.016686Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 6 00:23:28.017178 waagent[1618]: 2025-09-06T00:23:28.017119Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:23:28.017353 waagent[1618]: 2025-09-06T00:23:28.017301Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:23:28.017880 waagent[1618]: 2025-09-06T00:23:28.017827Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 6 00:23:28.018658 waagent[1618]: 2025-09-06T00:23:28.018602Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 6 00:23:28.018658 waagent[1618]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 6 00:23:28.018658 waagent[1618]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Sep 6 00:23:28.018658 waagent[1618]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 6 00:23:28.018658 waagent[1618]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:23:28.018658 waagent[1618]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:23:28.018658 waagent[1618]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 00:23:28.019071 waagent[1618]: 2025-09-06T00:23:28.019016Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 00:23:28.019295 waagent[1618]: 2025-09-06T00:23:28.019241Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 6 00:23:28.022433 waagent[1618]: 2025-09-06T00:23:28.022358Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 00:23:28.023206 waagent[1618]: 2025-09-06T00:23:28.023151Z INFO EnvHandler ExtHandler Configure routes Sep 6 00:23:28.023486 waagent[1618]: 2025-09-06T00:23:28.023430Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 6 00:23:28.023486 waagent[1618]: 2025-09-06T00:23:28.023331Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 6 00:23:28.023877 waagent[1618]: 2025-09-06T00:23:28.023826Z INFO EnvHandler ExtHandler Gateway:None Sep 6 00:23:28.025232 waagent[1618]: 2025-09-06T00:23:28.025159Z INFO EnvHandler ExtHandler Routes:None Sep 6 00:23:28.025760 waagent[1618]: 2025-09-06T00:23:28.025710Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 6 00:23:28.026227 waagent[1618]: 2025-09-06T00:23:28.026172Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 6 00:23:28.032619 waagent[1618]: 2025-09-06T00:23:28.032291Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 6 00:23:28.045336 waagent[1618]: 2025-09-06T00:23:28.043982Z INFO MonitorHandler ExtHandler Network interfaces: Sep 6 00:23:28.045336 waagent[1618]: Executing ['ip', '-a', '-o', 'link']: Sep 6 00:23:28.045336 waagent[1618]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 6 00:23:28.045336 waagent[1618]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:fb:31:2f brd ff:ff:ff:ff:ff:ff Sep 6 00:23:28.045336 waagent[1618]: 3: enP57342s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:fb:31:2f brd ff:ff:ff:ff:ff:ff\ altname enP57342p0s2 Sep 6 00:23:28.045336 waagent[1618]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 6 00:23:28.045336 waagent[1618]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 6 00:23:28.045336 waagent[1618]: 2: eth0 inet 10.200.8.21/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 6 00:23:28.045336 waagent[1618]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 6 00:23:28.045336 waagent[1618]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 6 00:23:28.045336 waagent[1618]: 2: eth0 inet6 fe80::7e1e:52ff:fefb:312f/64 scope link \ valid_lft forever preferred_lft forever Sep 6 00:23:28.056580 waagent[1618]: 2025-09-06T00:23:28.056492Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 6 00:23:28.079255 waagent[1618]: 2025-09-06T00:23:28.079164Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 6 00:23:28.097819 waagent[1618]: 2025-09-06T00:23:28.097746Z INFO ExtHandler ExtHandler Sep 6 00:23:28.100972 waagent[1618]: 2025-09-06T00:23:28.100815Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 044c7fb7-48c3-416d-a0fd-86e4b041d91b correlation c42eb8e0-e787-4a1f-a6aa-d6ad21e2def2 created: 2025-09-06T00:21:55.349365Z] Sep 6 00:23:28.106706 waagent[1618]: 2025-09-06T00:23:28.106611Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 6 00:23:28.109220 waagent[1618]: 2025-09-06T00:23:28.109160Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 11 ms] Sep 6 00:23:28.110894 waagent[1618]: 2025-09-06T00:23:28.110835Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: Sep 6 00:23:28.110894 waagent[1618]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:28.110894 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:28.110894 waagent[1618]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:28.110894 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:28.110894 waagent[1618]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:28.110894 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:28.110894 waagent[1618]: 81 11202 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 00:23:28.161897 waagent[1618]: 2025-09-06T00:23:28.161786Z INFO EnvHandler ExtHandler The firewall was setup successfully: Sep 6 00:23:28.161897 waagent[1618]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:28.161897 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:28.161897 waagent[1618]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:28.161897 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:28.161897 waagent[1618]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 00:23:28.161897 waagent[1618]: pkts bytes target prot opt in out source destination Sep 6 00:23:28.161897 waagent[1618]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 6 00:23:28.161897 waagent[1618]: 1 52 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 00:23:28.161897 waagent[1618]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 6 00:23:28.417329 waagent[1618]: 2025-09-06T00:23:28.417203Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 6 00:23:28.421594 waagent[1618]: 2025-09-06T00:23:28.421532Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: F4D0F14C-24B7-4B1B-BECE-55F9742DAD7C;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 6 00:23:28.421808 waagent[1618]: 2025-09-06T00:23:28.421754Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 6 00:23:36.020798 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 00:23:36.021108 systemd[1]: Stopped kubelet.service. Sep 6 00:23:36.022960 systemd[1]: Starting kubelet.service... Sep 6 00:23:36.121565 systemd[1]: Started kubelet.service. Sep 6 00:23:36.163122 kubelet[1666]: E0906 00:23:36.163060 1666 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:23:36.164987 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:23:36.165161 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:23:42.232586 systemd[1]: Created slice system-sshd.slice. Sep 6 00:23:42.234527 systemd[1]: Started sshd@0-10.200.8.21:22-10.200.16.10:59524.service. Sep 6 00:23:43.427340 sshd[1672]: Accepted publickey for core from 10.200.16.10 port 59524 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:23:43.428900 sshd[1672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:43.433933 systemd[1]: Started session-3.scope. Sep 6 00:23:43.434681 systemd-logind[1401]: New session 3 of user core. Sep 6 00:23:43.977875 systemd[1]: Started sshd@1-10.200.8.21:22-10.200.16.10:59538.service. Sep 6 00:23:44.613525 sshd[1677]: Accepted publickey for core from 10.200.16.10 port 59538 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:23:44.615056 sshd[1677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:44.618833 systemd-logind[1401]: New session 4 of user core. Sep 6 00:23:44.620184 systemd[1]: Started session-4.scope. Sep 6 00:23:45.068074 sshd[1677]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:45.071047 systemd[1]: sshd@1-10.200.8.21:22-10.200.16.10:59538.service: Deactivated successfully. Sep 6 00:23:45.071919 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 00:23:45.072560 systemd-logind[1401]: Session 4 logged out. Waiting for processes to exit. Sep 6 00:23:45.073410 systemd-logind[1401]: Removed session 4. Sep 6 00:23:45.174539 systemd[1]: Started sshd@2-10.200.8.21:22-10.200.16.10:59540.service. Sep 6 00:23:45.812276 sshd[1683]: Accepted publickey for core from 10.200.16.10 port 59540 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:23:45.813769 sshd[1683]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:45.818790 systemd[1]: Started session-5.scope. Sep 6 00:23:45.819533 systemd-logind[1401]: New session 5 of user core. Sep 6 00:23:46.259848 sshd[1683]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:46.263355 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 00:23:46.263837 systemd[1]: sshd@2-10.200.8.21:22-10.200.16.10:59540.service: Deactivated successfully. Sep 6 00:23:46.264661 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 00:23:46.265359 systemd[1]: Stopped kubelet.service. Sep 6 00:23:46.265498 systemd-logind[1401]: Session 5 logged out. Waiting for processes to exit. Sep 6 00:23:46.267087 systemd[1]: Starting kubelet.service... Sep 6 00:23:46.270254 systemd-logind[1401]: Removed session 5. Sep 6 00:23:46.368128 systemd[1]: Started sshd@3-10.200.8.21:22-10.200.16.10:59550.service. Sep 6 00:23:46.373825 systemd[1]: Started kubelet.service. Sep 6 00:23:47.009426 sshd[1692]: Accepted publickey for core from 10.200.16.10 port 59550 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:23:47.011302 sshd[1692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:47.016764 systemd[1]: Started session-6.scope. Sep 6 00:23:47.017500 systemd-logind[1401]: New session 6 of user core. Sep 6 00:23:47.085418 kubelet[1694]: E0906 00:23:47.085363 1694 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:23:47.087208 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:23:47.087375 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:23:47.464043 sshd[1692]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:47.466928 systemd[1]: sshd@3-10.200.8.21:22-10.200.16.10:59550.service: Deactivated successfully. Sep 6 00:23:47.467769 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 00:23:47.468412 systemd-logind[1401]: Session 6 logged out. Waiting for processes to exit. Sep 6 00:23:47.469223 systemd-logind[1401]: Removed session 6. Sep 6 00:23:47.570211 systemd[1]: Started sshd@4-10.200.8.21:22-10.200.16.10:59566.service. Sep 6 00:23:48.206559 sshd[1705]: Accepted publickey for core from 10.200.16.10 port 59566 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:23:48.208195 sshd[1705]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:48.213269 systemd[1]: Started session-7.scope. Sep 6 00:23:48.214056 systemd-logind[1401]: New session 7 of user core. Sep 6 00:23:48.806271 sudo[1708]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 00:23:48.806574 sudo[1708]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:48.828217 dbus-daemon[1389]: нCO\xf4U: received setenforce notice (enforcing=-1279131712) Sep 6 00:23:48.830251 sudo[1708]: pam_unix(sudo:session): session closed for user root Sep 6 00:23:48.947838 sshd[1705]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:48.951186 systemd[1]: sshd@4-10.200.8.21:22-10.200.16.10:59566.service: Deactivated successfully. Sep 6 00:23:48.952193 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 00:23:48.952867 systemd-logind[1401]: Session 7 logged out. Waiting for processes to exit. Sep 6 00:23:48.953983 systemd-logind[1401]: Removed session 7. Sep 6 00:23:49.058037 systemd[1]: Started sshd@5-10.200.8.21:22-10.200.16.10:59582.service. Sep 6 00:23:49.695560 sshd[1712]: Accepted publickey for core from 10.200.16.10 port 59582 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:23:49.697221 sshd[1712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:49.702237 systemd[1]: Started session-8.scope. Sep 6 00:23:49.702990 systemd-logind[1401]: New session 8 of user core. Sep 6 00:23:50.045431 sudo[1716]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 00:23:50.045736 sudo[1716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:50.048645 sudo[1716]: pam_unix(sudo:session): session closed for user root Sep 6 00:23:50.053376 sudo[1715]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 00:23:50.053662 sudo[1715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:50.062874 systemd[1]: Stopping audit-rules.service... Sep 6 00:23:50.063000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:23:50.065145 auditctl[1719]: No rules Sep 6 00:23:50.068225 kernel: kauditd_printk_skb: 3 callbacks suppressed Sep 6 00:23:50.068300 kernel: audit: type=1305 audit(1757118230.063:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:23:50.068597 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 00:23:50.068786 systemd[1]: Stopped audit-rules.service. Sep 6 00:23:50.070620 systemd[1]: Starting audit-rules.service... Sep 6 00:23:50.063000 audit[1719]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbaca5f40 a2=420 a3=0 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:50.093348 augenrules[1736]: No rules Sep 6 00:23:50.094176 systemd[1]: Finished audit-rules.service. Sep 6 00:23:50.096386 sudo[1715]: pam_unix(sudo:session): session closed for user root Sep 6 00:23:50.114369 kernel: audit: type=1300 audit(1757118230.063:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcbaca5f40 a2=420 a3=0 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:50.114448 kernel: audit: type=1327 audit(1757118230.063:207): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:23:50.063000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:23:50.119981 kernel: audit: type=1131 audit(1757118230.067:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.133982 kernel: audit: type=1130 audit(1757118230.092:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.092000 audit[1715]: USER_END pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.161152 kernel: audit: type=1106 audit(1757118230.092:210): pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.161235 kernel: audit: type=1104 audit(1757118230.092:211): pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.092000 audit[1715]: CRED_DISP pid=1715 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.199023 sshd[1712]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:50.199000 audit[1712]: USER_END pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:50.202060 systemd[1]: sshd@5-10.200.8.21:22-10.200.16.10:59582.service: Deactivated successfully. Sep 6 00:23:50.203406 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 00:23:50.204499 systemd-logind[1401]: Session 8 logged out. Waiting for processes to exit. Sep 6 00:23:50.205454 systemd-logind[1401]: Removed session 8. Sep 6 00:23:50.199000 audit[1712]: CRED_DISP pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:50.236892 kernel: audit: type=1106 audit(1757118230.199:212): pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:50.237065 kernel: audit: type=1104 audit(1757118230.199:213): pid=1712 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:50.237095 kernel: audit: type=1131 audit(1757118230.201:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.21:22-10.200.16.10:59582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.21:22-10.200.16.10:59582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.305207 systemd[1]: Started sshd@6-10.200.8.21:22-10.200.16.10:45218.service. Sep 6 00:23:50.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.21:22-10.200.16.10:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:50.941000 audit[1742]: USER_ACCT pid=1742 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:50.942334 sshd[1742]: Accepted publickey for core from 10.200.16.10 port 45218 ssh2: RSA SHA256:uuTnLiNcRPm0GiQNxQzV5yeEUYAAoVqCJQ50MkNRqrg Sep 6 00:23:50.942000 audit[1742]: CRED_ACQ pid=1742 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:50.942000 audit[1742]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc765a5b20 a2=3 a3=0 items=0 ppid=1 pid=1742 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:50.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:23:50.943855 sshd[1742]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:23:50.948780 systemd[1]: Started session-9.scope. Sep 6 00:23:50.949530 systemd-logind[1401]: New session 9 of user core. Sep 6 00:23:50.952000 audit[1742]: USER_START pid=1742 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:50.954000 audit[1744]: CRED_ACQ pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:51.289000 audit[1745]: USER_ACCT pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.289000 audit[1745]: CRED_REFR pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.290773 sudo[1745]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 00:23:51.291097 sudo[1745]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:23:51.291000 audit[1745]: USER_START pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.304819 systemd[1]: Starting coreos-metadata.service... Sep 6 00:23:51.381024 coreos-metadata[1749]: Sep 06 00:23:51.380 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 6 00:23:51.383318 coreos-metadata[1749]: Sep 06 00:23:51.383 INFO Fetch successful Sep 6 00:23:51.383636 coreos-metadata[1749]: Sep 06 00:23:51.383 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 6 00:23:51.384884 coreos-metadata[1749]: Sep 06 00:23:51.384 INFO Fetch successful Sep 6 00:23:51.385275 coreos-metadata[1749]: Sep 06 00:23:51.385 INFO Fetching http://168.63.129.16/machine/5b2091a9-5dd2-49ee-be3d-9fb5e7c11696/76c207ed%2De3e2%2D4ab8%2D8f5c%2D2eecc2865f31.%5Fci%2D3510.3.8%2Dn%2D0e63f2a0ae?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 6 00:23:51.386460 coreos-metadata[1749]: Sep 06 00:23:51.386 INFO Fetch successful Sep 6 00:23:51.420494 coreos-metadata[1749]: Sep 06 00:23:51.420 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 6 00:23:51.429573 coreos-metadata[1749]: Sep 06 00:23:51.429 INFO Fetch successful Sep 6 00:23:51.438731 systemd[1]: Finished coreos-metadata.service. Sep 6 00:23:51.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.952699 systemd[1]: Stopped kubelet.service. Sep 6 00:23:51.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:51.956320 systemd[1]: Starting kubelet.service... Sep 6 00:23:51.991801 systemd[1]: Reloading. Sep 6 00:23:52.123071 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2025-09-06T00:23:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:23:52.127353 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2025-09-06T00:23:52Z" level=info msg="torcx already run" Sep 6 00:23:52.209749 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:23:52.209771 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:23:52.226777 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.299000 audit: BPF prog-id=44 op=LOAD Sep 6 00:23:52.299000 audit: BPF prog-id=37 op=UNLOAD Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit: BPF prog-id=45 op=LOAD Sep 6 00:23:52.300000 audit: BPF prog-id=27 op=UNLOAD Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit: BPF prog-id=46 op=LOAD Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.300000 audit: BPF prog-id=47 op=LOAD Sep 6 00:23:52.300000 audit: BPF prog-id=28 op=UNLOAD Sep 6 00:23:52.300000 audit: BPF prog-id=29 op=UNLOAD Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.302000 audit: BPF prog-id=48 op=LOAD Sep 6 00:23:52.302000 audit: BPF prog-id=36 op=UNLOAD Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.303000 audit: BPF prog-id=49 op=LOAD Sep 6 00:23:52.303000 audit: BPF prog-id=41 op=UNLOAD Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit: BPF prog-id=50 op=LOAD Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.304000 audit: BPF prog-id=51 op=LOAD Sep 6 00:23:52.304000 audit: BPF prog-id=30 op=UNLOAD Sep 6 00:23:52.304000 audit: BPF prog-id=31 op=UNLOAD Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit: BPF prog-id=52 op=LOAD Sep 6 00:23:52.307000 audit: BPF prog-id=38 op=UNLOAD Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit: BPF prog-id=53 op=LOAD Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.308000 audit: BPF prog-id=54 op=LOAD Sep 6 00:23:52.308000 audit: BPF prog-id=39 op=UNLOAD Sep 6 00:23:52.308000 audit: BPF prog-id=40 op=UNLOAD Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit: BPF prog-id=55 op=LOAD Sep 6 00:23:52.310000 audit: BPF prog-id=43 op=UNLOAD Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit: BPF prog-id=56 op=LOAD Sep 6 00:23:52.311000 audit: BPF prog-id=33 op=UNLOAD Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit: BPF prog-id=57 op=LOAD Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:52.311000 audit: BPF prog-id=58 op=LOAD Sep 6 00:23:52.311000 audit: BPF prog-id=34 op=UNLOAD Sep 6 00:23:52.311000 audit: BPF prog-id=35 op=UNLOAD Sep 6 00:23:52.334033 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Sep 6 00:23:52.334282 systemd[1]: kubelet.service: Failed with result 'signal'. Sep 6 00:23:52.334559 systemd[1]: Stopped kubelet.service. Sep 6 00:23:52.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:23:52.336588 systemd[1]: Starting kubelet.service... Sep 6 00:23:52.560677 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Sep 6 00:23:53.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:53.425309 systemd[1]: Started kubelet.service. Sep 6 00:23:53.489697 kubelet[1873]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:23:53.489697 kubelet[1873]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 00:23:53.489697 kubelet[1873]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:23:53.490275 kubelet[1873]: I0906 00:23:53.489782 1873 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 00:23:54.316982 kubelet[1873]: I0906 00:23:54.316914 1873 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 6 00:23:54.316982 kubelet[1873]: I0906 00:23:54.316953 1873 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 00:23:54.317536 kubelet[1873]: I0906 00:23:54.317509 1873 server.go:956] "Client rotation is on, will bootstrap in background" Sep 6 00:23:54.371309 kubelet[1873]: I0906 00:23:54.371271 1873 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 00:23:54.383945 kubelet[1873]: E0906 00:23:54.383901 1873 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 00:23:54.383945 kubelet[1873]: I0906 00:23:54.383942 1873 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 00:23:54.388986 kubelet[1873]: I0906 00:23:54.388688 1873 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 00:23:54.388986 kubelet[1873]: I0906 00:23:54.388954 1873 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 00:23:54.389242 kubelet[1873]: I0906 00:23:54.389007 1873 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.8.21","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 00:23:54.389410 kubelet[1873]: I0906 00:23:54.389269 1873 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 00:23:54.389410 kubelet[1873]: I0906 00:23:54.389283 1873 container_manager_linux.go:303] "Creating device plugin manager" Sep 6 00:23:54.389504 kubelet[1873]: I0906 00:23:54.389444 1873 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:23:54.396552 kubelet[1873]: I0906 00:23:54.396511 1873 kubelet.go:480] "Attempting to sync node with API server" Sep 6 00:23:54.396657 kubelet[1873]: I0906 00:23:54.396573 1873 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 00:23:54.396657 kubelet[1873]: I0906 00:23:54.396607 1873 kubelet.go:386] "Adding apiserver pod source" Sep 6 00:23:54.396657 kubelet[1873]: I0906 00:23:54.396625 1873 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 00:23:54.406070 kubelet[1873]: E0906 00:23:54.406033 1873 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:23:54.406169 kubelet[1873]: E0906 00:23:54.406094 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:23:54.410609 kubelet[1873]: I0906 00:23:54.410590 1873 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 00:23:54.411351 kubelet[1873]: I0906 00:23:54.411329 1873 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 6 00:23:54.412129 kubelet[1873]: W0906 00:23:54.412111 1873 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 00:23:54.415347 kubelet[1873]: I0906 00:23:54.415156 1873 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 00:23:54.415347 kubelet[1873]: I0906 00:23:54.415215 1873 server.go:1289] "Started kubelet" Sep 6 00:23:54.424754 kubelet[1873]: I0906 00:23:54.424705 1873 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 00:23:54.425798 kubelet[1873]: I0906 00:23:54.425777 1873 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 00:23:54.425980 kubelet[1873]: I0906 00:23:54.425941 1873 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 00:23:54.425000 audit[1873]: AVC avc: denied { mac_admin } for pid=1873 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:54.425000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:23:54.425000 audit[1873]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fb050 a1=c0009c09d8 a2=c0009fb020 a3=25 items=0 ppid=1 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.425000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:23:54.425000 audit[1873]: AVC avc: denied { mac_admin } for pid=1873 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:54.425000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:23:54.425000 audit[1873]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009b7080 a1=c0009c09f0 a2=c0009fb0e0 a3=25 items=0 ppid=1 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.425000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:23:54.426896 kubelet[1873]: I0906 00:23:54.426327 1873 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 00:23:54.426896 kubelet[1873]: I0906 00:23:54.426386 1873 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 00:23:54.426896 kubelet[1873]: I0906 00:23:54.426476 1873 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 00:23:54.427863 kubelet[1873]: I0906 00:23:54.427844 1873 server.go:317] "Adding debug handlers to kubelet server" Sep 6 00:23:54.432436 kubelet[1873]: I0906 00:23:54.432413 1873 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 00:23:54.434000 audit[1890]: NETFILTER_CFG table=mangle:7 family=2 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.434000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6d395970 a2=0 a3=7ffd6d39595c items=0 ppid=1873 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:23:54.435914 kubelet[1873]: I0906 00:23:54.435885 1873 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 00:23:54.436335 kubelet[1873]: I0906 00:23:54.436312 1873 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 00:23:54.436417 kubelet[1873]: I0906 00:23:54.436366 1873 reconciler.go:26] "Reconciler: start to sync state" Sep 6 00:23:54.437105 kubelet[1873]: E0906 00:23:54.436660 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.8.21\" not found" Sep 6 00:23:54.437200 kubelet[1873]: I0906 00:23:54.437139 1873 factory.go:223] Registration of the systemd container factory successfully Sep 6 00:23:54.437316 kubelet[1873]: I0906 00:23:54.437279 1873 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 00:23:54.438000 audit[1891]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.438000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff2fe777d0 a2=0 a3=7fff2fe777bc items=0 ppid=1873 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:23:54.442200 kubelet[1873]: E0906 00:23:54.442174 1873 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.21\" not found" node="10.200.8.21" Sep 6 00:23:54.442538 kubelet[1873]: I0906 00:23:54.442518 1873 factory.go:223] Registration of the containerd container factory successfully Sep 6 00:23:54.451000 audit[1893]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.451000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3211fd40 a2=0 a3=7ffe3211fd2c items=0 ppid=1873 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:23:54.453000 audit[1895]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.453000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc81fa11f0 a2=0 a3=7ffc81fa11dc items=0 ppid=1873 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:23:54.465496 kubelet[1873]: E0906 00:23:54.465466 1873 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 00:23:54.469481 kubelet[1873]: I0906 00:23:54.469466 1873 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 00:23:54.469594 kubelet[1873]: I0906 00:23:54.469584 1873 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 00:23:54.469659 kubelet[1873]: I0906 00:23:54.469645 1873 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:23:54.474988 kubelet[1873]: I0906 00:23:54.474949 1873 policy_none.go:49] "None policy: Start" Sep 6 00:23:54.475100 kubelet[1873]: I0906 00:23:54.475092 1873 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 00:23:54.475169 kubelet[1873]: I0906 00:23:54.475163 1873 state_mem.go:35] "Initializing new in-memory state store" Sep 6 00:23:54.483517 systemd[1]: Created slice kubepods.slice. Sep 6 00:23:54.488223 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 00:23:54.491493 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 00:23:54.497000 audit[1873]: AVC avc: denied { mac_admin } for pid=1873 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:54.497000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:23:54.497000 audit[1873]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009bb980 a1=c000a382d0 a2=c0009bb950 a3=25 items=0 ppid=1 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.497000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:23:54.498853 kubelet[1873]: E0906 00:23:54.498459 1873 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 6 00:23:54.498853 kubelet[1873]: E0906 00:23:54.498543 1873 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 6 00:23:54.498853 kubelet[1873]: I0906 00:23:54.498699 1873 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 00:23:54.498853 kubelet[1873]: I0906 00:23:54.498716 1873 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 00:23:54.500597 kubelet[1873]: I0906 00:23:54.499637 1873 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 00:23:54.502208 kubelet[1873]: E0906 00:23:54.502180 1873 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 00:23:54.502297 kubelet[1873]: E0906 00:23:54.502237 1873 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.21\" not found" Sep 6 00:23:54.503000 audit[1902]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.503000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd54af2270 a2=0 a3=7ffd54af225c items=0 ppid=1873 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 00:23:54.504436 kubelet[1873]: I0906 00:23:54.504395 1873 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 6 00:23:54.504000 audit[1903]: NETFILTER_CFG table=mangle:12 family=10 entries=2 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:23:54.504000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe977f1730 a2=0 a3=7ffe977f171c items=0 ppid=1873 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:23:54.505000 audit[1904]: NETFILTER_CFG table=mangle:13 family=2 entries=1 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.505000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe7413f60 a2=0 a3=7fffe7413f4c items=0 ppid=1873 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:23:54.506585 kubelet[1873]: I0906 00:23:54.506564 1873 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 6 00:23:54.506652 kubelet[1873]: I0906 00:23:54.506589 1873 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 6 00:23:54.506652 kubelet[1873]: I0906 00:23:54.506613 1873 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 00:23:54.506652 kubelet[1873]: I0906 00:23:54.506622 1873 kubelet.go:2436] "Starting kubelet main sync loop" Sep 6 00:23:54.506759 kubelet[1873]: E0906 00:23:54.506731 1873 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 6 00:23:54.506000 audit[1905]: NETFILTER_CFG table=nat:14 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.506000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc615fc3b0 a2=0 a3=7ffc615fc39c items=0 ppid=1873 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.506000 audit[1906]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:23:54.506000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe154053b0 a2=0 a3=7ffe1540539c items=0 ppid=1873 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:23:54.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:23:54.508000 audit[1907]: NETFILTER_CFG table=nat:16 family=10 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:23:54.508000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffc1247210 a2=0 a3=7fffc12471fc items=0 ppid=1873 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:23:54.508000 audit[1908]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:23:54.508000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe1ee8f70 a2=0 a3=7fffe1ee8f5c items=0 ppid=1873 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:23:54.510000 audit[1909]: NETFILTER_CFG table=filter:18 family=10 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:23:54.510000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6f6f8d50 a2=0 a3=7ffd6f6f8d3c items=0 ppid=1873 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:54.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:23:54.602711 kubelet[1873]: I0906 00:23:54.599889 1873 kubelet_node_status.go:75] "Attempting to register node" node="10.200.8.21" Sep 6 00:23:54.615364 kubelet[1873]: I0906 00:23:54.615317 1873 kubelet_node_status.go:78] "Successfully registered node" node="10.200.8.21" Sep 6 00:23:54.627463 kubelet[1873]: I0906 00:23:54.627421 1873 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 6 00:23:54.627821 env[1411]: time="2025-09-06T00:23:54.627781732Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 00:23:54.628282 kubelet[1873]: I0906 00:23:54.628072 1873 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 6 00:23:54.959000 audit[1745]: USER_END pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:54.959000 audit[1745]: CRED_DISP pid=1745 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:23:54.960443 sudo[1745]: pam_unix(sudo:session): session closed for user root Sep 6 00:23:55.063678 sshd[1742]: pam_unix(sshd:session): session closed for user core Sep 6 00:23:55.064000 audit[1742]: USER_END pid=1742 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:55.067337 systemd[1]: sshd@6-10.200.8.21:22-10.200.16.10:45218.service: Deactivated successfully. Sep 6 00:23:55.068696 kernel: kauditd_printk_skb: 238 callbacks suppressed Sep 6 00:23:55.068748 kernel: audit: type=1106 audit(1757118235.064:418): pid=1742 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:55.068125 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 00:23:55.069490 systemd-logind[1401]: Session 9 logged out. Waiting for processes to exit. Sep 6 00:23:55.070552 systemd-logind[1401]: Removed session 9. Sep 6 00:23:55.064000 audit[1742]: CRED_DISP pid=1742 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:55.100693 kernel: audit: type=1104 audit(1757118235.064:419): pid=1742 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 00:23:55.100761 kernel: audit: type=1131 audit(1757118235.064:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.21:22-10.200.16.10:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:55.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.21:22-10.200.16.10:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:23:55.320832 kubelet[1873]: I0906 00:23:55.320777 1873 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 6 00:23:55.321149 kubelet[1873]: I0906 00:23:55.321121 1873 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 00:23:55.321464 kubelet[1873]: I0906 00:23:55.321439 1873 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 00:23:55.321541 kubelet[1873]: I0906 00:23:55.321483 1873 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 00:23:55.406560 kubelet[1873]: E0906 00:23:55.406480 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:23:55.408649 kubelet[1873]: I0906 00:23:55.408623 1873 apiserver.go:52] "Watching apiserver" Sep 6 00:23:55.424510 systemd[1]: Created slice kubepods-besteffort-podd9d20316_c035_44a1_a93e_fb58d68528e9.slice. Sep 6 00:23:55.426342 kubelet[1873]: E0906 00:23:55.426298 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:23:55.434007 systemd[1]: Created slice kubepods-besteffort-pod4157c3ce_2079_4ca6_ae19_491376313f83.slice. Sep 6 00:23:55.437087 kubelet[1873]: I0906 00:23:55.437057 1873 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 00:23:55.445811 kubelet[1873]: I0906 00:23:55.445784 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d9d20316-c035-44a1-a93e-fb58d68528e9-xtables-lock\") pod \"kube-proxy-lz546\" (UID: \"d9d20316-c035-44a1-a93e-fb58d68528e9\") " pod="kube-system/kube-proxy-lz546" Sep 6 00:23:55.445996 kubelet[1873]: I0906 00:23:55.445956 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lh9vp\" (UniqueName: \"kubernetes.io/projected/d9d20316-c035-44a1-a93e-fb58d68528e9-kube-api-access-lh9vp\") pod \"kube-proxy-lz546\" (UID: \"d9d20316-c035-44a1-a93e-fb58d68528e9\") " pod="kube-system/kube-proxy-lz546" Sep 6 00:23:55.446118 kubelet[1873]: I0906 00:23:55.446102 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-flexvol-driver-host\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.446221 kubelet[1873]: I0906 00:23:55.446205 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-policysync\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.446345 kubelet[1873]: I0906 00:23:55.446328 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hwn66\" (UniqueName: \"kubernetes.io/projected/ace0bd0b-5c74-4ef2-875b-36412762cdca-kube-api-access-hwn66\") pod \"csi-node-driver-2vlwd\" (UID: \"ace0bd0b-5c74-4ef2-875b-36412762cdca\") " pod="calico-system/csi-node-driver-2vlwd" Sep 6 00:23:55.446480 kubelet[1873]: I0906 00:23:55.446465 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d9d20316-c035-44a1-a93e-fb58d68528e9-kube-proxy\") pod \"kube-proxy-lz546\" (UID: \"d9d20316-c035-44a1-a93e-fb58d68528e9\") " pod="kube-system/kube-proxy-lz546" Sep 6 00:23:55.446590 kubelet[1873]: I0906 00:23:55.446576 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-cni-log-dir\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.446684 kubelet[1873]: I0906 00:23:55.446670 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-cni-net-dir\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.446780 kubelet[1873]: I0906 00:23:55.446764 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fl4rl\" (UniqueName: \"kubernetes.io/projected/4157c3ce-2079-4ca6-ae19-491376313f83-kube-api-access-fl4rl\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.446924 kubelet[1873]: I0906 00:23:55.446894 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ace0bd0b-5c74-4ef2-875b-36412762cdca-registration-dir\") pod \"csi-node-driver-2vlwd\" (UID: \"ace0bd0b-5c74-4ef2-875b-36412762cdca\") " pod="calico-system/csi-node-driver-2vlwd" Sep 6 00:23:55.447049 kubelet[1873]: I0906 00:23:55.447031 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ace0bd0b-5c74-4ef2-875b-36412762cdca-varrun\") pod \"csi-node-driver-2vlwd\" (UID: \"ace0bd0b-5c74-4ef2-875b-36412762cdca\") " pod="calico-system/csi-node-driver-2vlwd" Sep 6 00:23:55.447170 kubelet[1873]: I0906 00:23:55.447149 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-var-lib-calico\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.447268 kubelet[1873]: I0906 00:23:55.447252 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d9d20316-c035-44a1-a93e-fb58d68528e9-lib-modules\") pod \"kube-proxy-lz546\" (UID: \"d9d20316-c035-44a1-a93e-fb58d68528e9\") " pod="kube-system/kube-proxy-lz546" Sep 6 00:23:55.447410 kubelet[1873]: I0906 00:23:55.447393 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-lib-modules\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.447533 kubelet[1873]: I0906 00:23:55.447517 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4157c3ce-2079-4ca6-ae19-491376313f83-node-certs\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.447636 kubelet[1873]: I0906 00:23:55.447620 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4157c3ce-2079-4ca6-ae19-491376313f83-tigera-ca-bundle\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.447751 kubelet[1873]: I0906 00:23:55.447733 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ace0bd0b-5c74-4ef2-875b-36412762cdca-kubelet-dir\") pod \"csi-node-driver-2vlwd\" (UID: \"ace0bd0b-5c74-4ef2-875b-36412762cdca\") " pod="calico-system/csi-node-driver-2vlwd" Sep 6 00:23:55.447854 kubelet[1873]: I0906 00:23:55.447838 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-cni-bin-dir\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.447946 kubelet[1873]: I0906 00:23:55.447932 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-var-run-calico\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.448060 kubelet[1873]: I0906 00:23:55.448045 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4157c3ce-2079-4ca6-ae19-491376313f83-xtables-lock\") pod \"calico-node-rhchv\" (UID: \"4157c3ce-2079-4ca6-ae19-491376313f83\") " pod="calico-system/calico-node-rhchv" Sep 6 00:23:55.448147 kubelet[1873]: I0906 00:23:55.448133 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ace0bd0b-5c74-4ef2-875b-36412762cdca-socket-dir\") pod \"csi-node-driver-2vlwd\" (UID: \"ace0bd0b-5c74-4ef2-875b-36412762cdca\") " pod="calico-system/csi-node-driver-2vlwd" Sep 6 00:23:55.549895 kubelet[1873]: I0906 00:23:55.549852 1873 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 00:23:55.551521 kubelet[1873]: E0906 00:23:55.551457 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.551754 kubelet[1873]: W0906 00:23:55.551725 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.551866 kubelet[1873]: E0906 00:23:55.551850 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.552729 kubelet[1873]: E0906 00:23:55.552711 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.552876 kubelet[1873]: W0906 00:23:55.552859 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.552996 kubelet[1873]: E0906 00:23:55.552973 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.553332 kubelet[1873]: E0906 00:23:55.553319 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.553425 kubelet[1873]: W0906 00:23:55.553413 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.553509 kubelet[1873]: E0906 00:23:55.553498 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.553817 kubelet[1873]: E0906 00:23:55.553805 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.553931 kubelet[1873]: W0906 00:23:55.553919 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.554083 kubelet[1873]: E0906 00:23:55.554070 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.554408 kubelet[1873]: E0906 00:23:55.554392 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.554514 kubelet[1873]: W0906 00:23:55.554501 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.560077 kubelet[1873]: E0906 00:23:55.560053 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.560282 kubelet[1873]: E0906 00:23:55.560264 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.560362 kubelet[1873]: W0906 00:23:55.560282 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.560362 kubelet[1873]: E0906 00:23:55.560296 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.560495 kubelet[1873]: E0906 00:23:55.560474 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.560550 kubelet[1873]: W0906 00:23:55.560495 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.560550 kubelet[1873]: E0906 00:23:55.560508 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.560765 kubelet[1873]: E0906 00:23:55.560748 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.560841 kubelet[1873]: W0906 00:23:55.560765 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.560841 kubelet[1873]: E0906 00:23:55.560779 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.560981 kubelet[1873]: E0906 00:23:55.560955 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.561057 kubelet[1873]: W0906 00:23:55.560982 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.561057 kubelet[1873]: E0906 00:23:55.560998 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.561199 kubelet[1873]: E0906 00:23:55.561185 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.561264 kubelet[1873]: W0906 00:23:55.561201 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.561264 kubelet[1873]: E0906 00:23:55.561214 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.561495 kubelet[1873]: E0906 00:23:55.561477 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.561495 kubelet[1873]: W0906 00:23:55.561494 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.561619 kubelet[1873]: E0906 00:23:55.561509 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.561713 kubelet[1873]: E0906 00:23:55.561698 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.561777 kubelet[1873]: W0906 00:23:55.561716 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.561777 kubelet[1873]: E0906 00:23:55.561729 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.561911 kubelet[1873]: E0906 00:23:55.561897 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.561976 kubelet[1873]: W0906 00:23:55.561913 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.561976 kubelet[1873]: E0906 00:23:55.561925 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.562183 kubelet[1873]: E0906 00:23:55.562159 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.562183 kubelet[1873]: W0906 00:23:55.562177 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.562298 kubelet[1873]: E0906 00:23:55.562191 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.562400 kubelet[1873]: E0906 00:23:55.562384 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.562469 kubelet[1873]: W0906 00:23:55.562401 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.562469 kubelet[1873]: E0906 00:23:55.562416 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.562598 kubelet[1873]: E0906 00:23:55.562584 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.562646 kubelet[1873]: W0906 00:23:55.562601 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.562646 kubelet[1873]: E0906 00:23:55.562614 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.562845 kubelet[1873]: E0906 00:23:55.562819 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.562845 kubelet[1873]: W0906 00:23:55.562838 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.562984 kubelet[1873]: E0906 00:23:55.562854 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.583493 kubelet[1873]: E0906 00:23:55.577171 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.583493 kubelet[1873]: W0906 00:23:55.583007 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.583493 kubelet[1873]: E0906 00:23:55.583034 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.585300 kubelet[1873]: E0906 00:23:55.585280 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.585300 kubelet[1873]: W0906 00:23:55.585295 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.585451 kubelet[1873]: E0906 00:23:55.585313 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.585555 kubelet[1873]: E0906 00:23:55.585536 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.585555 kubelet[1873]: W0906 00:23:55.585550 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.585664 kubelet[1873]: E0906 00:23:55.585564 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.585819 kubelet[1873]: E0906 00:23:55.585799 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.585887 kubelet[1873]: W0906 00:23:55.585820 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.585887 kubelet[1873]: E0906 00:23:55.585835 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.586088 kubelet[1873]: E0906 00:23:55.586074 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.586088 kubelet[1873]: W0906 00:23:55.586087 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.586202 kubelet[1873]: E0906 00:23:55.586100 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.586349 kubelet[1873]: E0906 00:23:55.586332 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.586433 kubelet[1873]: W0906 00:23:55.586353 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.586433 kubelet[1873]: E0906 00:23:55.586368 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.586633 kubelet[1873]: E0906 00:23:55.586619 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.586696 kubelet[1873]: W0906 00:23:55.586638 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.586696 kubelet[1873]: E0906 00:23:55.586652 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.586928 kubelet[1873]: E0906 00:23:55.586911 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:23:55.586928 kubelet[1873]: W0906 00:23:55.586924 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:23:55.587053 kubelet[1873]: E0906 00:23:55.586937 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:23:55.731625 env[1411]: time="2025-09-06T00:23:55.731566692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lz546,Uid:d9d20316-c035-44a1-a93e-fb58d68528e9,Namespace:kube-system,Attempt:0,}" Sep 6 00:23:55.750038 env[1411]: time="2025-09-06T00:23:55.749994742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rhchv,Uid:4157c3ce-2079-4ca6-ae19-491376313f83,Namespace:calico-system,Attempt:0,}" Sep 6 00:23:56.407109 kubelet[1873]: E0906 00:23:56.407053 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:23:57.407738 kubelet[1873]: E0906 00:23:57.407690 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:23:57.507090 kubelet[1873]: E0906 00:23:57.507009 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:23:58.407983 kubelet[1873]: E0906 00:23:58.407930 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:23:58.911825 update_engine[1402]: I0906 00:23:58.911777 1402 update_attempter.cc:509] Updating boot flags... Sep 6 00:23:59.097747 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount469415861.mount: Deactivated successfully. Sep 6 00:23:59.125901 env[1411]: time="2025-09-06T00:23:59.124894640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.131006 env[1411]: time="2025-09-06T00:23:59.130951953Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.134289 env[1411]: time="2025-09-06T00:23:59.134252160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.140643 env[1411]: time="2025-09-06T00:23:59.140605673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.144106 env[1411]: time="2025-09-06T00:23:59.144072781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.146417 env[1411]: time="2025-09-06T00:23:59.146382385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.150619 env[1411]: time="2025-09-06T00:23:59.150587294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.160899 env[1411]: time="2025-09-06T00:23:59.160867116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:23:59.211988 env[1411]: time="2025-09-06T00:23:59.211447722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:23:59.212176 env[1411]: time="2025-09-06T00:23:59.211491622Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:23:59.212176 env[1411]: time="2025-09-06T00:23:59.211505422Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:23:59.212176 env[1411]: time="2025-09-06T00:23:59.211730622Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4 pid=1988 runtime=io.containerd.runc.v2 Sep 6 00:23:59.236163 systemd[1]: Started cri-containerd-2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4.scope. Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.265014 kernel: audit: type=1400 audit(1757118239.249:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.270682 env[1411]: time="2025-09-06T00:23:59.270620946Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.283100 env[1411]: time="2025-09-06T00:23:59.270666246Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:23:59.283100 env[1411]: time="2025-09-06T00:23:59.270908046Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:23:59.285745 env[1411]: time="2025-09-06T00:23:59.285679077Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb86045055c108e74638d7447def73789f6ae5a3d5470b1a5f64d7a199937544 pid=2022 runtime=io.containerd.runc.v2 Sep 6 00:23:59.285989 kernel: audit: type=1400 audit(1757118239.249:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.304720 env[1411]: time="2025-09-06T00:23:59.298878105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rhchv,Uid:4157c3ce-2079-4ca6-ae19-491376313f83,Namespace:calico-system,Attempt:0,} returns sandbox id \"2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4\"" Sep 6 00:23:59.304720 env[1411]: time="2025-09-06T00:23:59.301315910Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.319403 kernel: audit: type=1400 audit(1757118239.249:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.319532 kernel: audit: type=1400 audit(1757118239.249:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.321397 systemd[1]: Started cri-containerd-bb86045055c108e74638d7447def73789f6ae5a3d5470b1a5f64d7a199937544.scope. Sep 6 00:23:59.335714 kernel: audit: type=1400 audit(1757118239.249:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.338531 kernel: audit: type=1400 audit(1757118239.249:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.352057 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit: BPF prog-id=59 op=LOAD Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383765326161633466303132613731396535323064643433626530 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383765326161633466303132613731396535323064643433626530 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.263000 audit: BPF prog-id=60 op=LOAD Sep 6 00:23:59.263000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d8f80 items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383765326161633466303132613731396535323064643433626530 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit: BPF prog-id=61 op=LOAD Sep 6 00:23:59.264000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d8fc8 items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383765326161633466303132613731396535323064643433626530 Sep 6 00:23:59.264000 audit: BPF prog-id=61 op=UNLOAD Sep 6 00:23:59.264000 audit: BPF prog-id=60 op=UNLOAD Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.264000 audit: BPF prog-id=62 op=LOAD Sep 6 00:23:59.264000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d93d8 items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383765326161633466303132613731396535323064643433626530 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.352000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.352000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185df0 items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262383630343530353563313038653734363338643734343764656637 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit: BPF prog-id=65 op=LOAD Sep 6 00:23:59.355000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185e38 items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262383630343530353563313038653734363338643734343764656637 Sep 6 00:23:59.355000 audit: BPF prog-id=65 op=UNLOAD Sep 6 00:23:59.355000 audit: BPF prog-id=64 op=UNLOAD Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:23:59.355000 audit: BPF prog-id=66 op=LOAD Sep 6 00:23:59.355000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2248 items=0 ppid=2022 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:23:59.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262383630343530353563313038653734363338643734343764656637 Sep 6 00:23:59.373246 env[1411]: time="2025-09-06T00:23:59.373202660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lz546,Uid:d9d20316-c035-44a1-a93e-fb58d68528e9,Namespace:kube-system,Attempt:0,} returns sandbox id \"bb86045055c108e74638d7447def73789f6ae5a3d5470b1a5f64d7a199937544\"" Sep 6 00:23:59.408622 kubelet[1873]: E0906 00:23:59.408569 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:23:59.507428 kubelet[1873]: E0906 00:23:59.506991 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:24:00.408813 kubelet[1873]: E0906 00:24:00.408760 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:00.559249 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount332369403.mount: Deactivated successfully. Sep 6 00:24:00.713129 env[1411]: time="2025-09-06T00:24:00.712805175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:00.718282 env[1411]: time="2025-09-06T00:24:00.718246586Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:00.722112 env[1411]: time="2025-09-06T00:24:00.722082793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:00.725480 env[1411]: time="2025-09-06T00:24:00.725446000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:00.725883 env[1411]: time="2025-09-06T00:24:00.725852101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 00:24:00.728075 env[1411]: time="2025-09-06T00:24:00.728049205Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\"" Sep 6 00:24:00.733207 env[1411]: time="2025-09-06T00:24:00.733169915Z" level=info msg="CreateContainer within sandbox \"2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 00:24:00.772524 env[1411]: time="2025-09-06T00:24:00.772486492Z" level=info msg="CreateContainer within sandbox \"2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940\"" Sep 6 00:24:00.773191 env[1411]: time="2025-09-06T00:24:00.773126794Z" level=info msg="StartContainer for \"d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940\"" Sep 6 00:24:00.793848 systemd[1]: Started cri-containerd-d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940.scope. Sep 6 00:24:00.831247 kernel: kauditd_printk_skb: 131 callbacks suppressed Sep 6 00:24:00.831382 kernel: audit: type=1400 audit(1757118240.810:453): avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f1f8805d1e8 items=0 ppid=1988 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:00.854311 kernel: audit: type=1300 audit(1757118240.810:453): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f1f8805d1e8 items=0 ppid=1988 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:00.854353 kernel: audit: type=1327 audit(1757118240.810:453): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436353334646134363335336533356336613734633438623261613766 Sep 6 00:24:00.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436353334646134363335336533356336613734633438623261613766 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.904250 kernel: audit: type=1400 audit(1757118240.810:454): avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.904342 kernel: audit: type=1400 audit(1757118240.810:454): avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.917802 kernel: audit: type=1400 audit(1757118240.810:454): avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.918952 systemd[1]: cri-containerd-d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940.scope: Deactivated successfully. Sep 6 00:24:00.933546 kernel: audit: type=1400 audit(1757118240.810:454): avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.948928 kernel: audit: type=1400 audit(1757118240.810:454): avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.955698 env[1411]: time="2025-09-06T00:24:00.955657452Z" level=info msg="StartContainer for \"d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940\" returns successfully" Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.979951 kernel: audit: type=1400 audit(1757118240.810:454): avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.980052 kernel: audit: type=1400 audit(1757118240.810:454): avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.810000 audit: BPF prog-id=67 op=LOAD Sep 6 00:24:00.810000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0002d9ba8 items=0 ppid=1988 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:00.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436353334646134363335336533356336613734633438623261613766 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit: BPF prog-id=68 op=LOAD Sep 6 00:24:00.830000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0002d9bf8 items=0 ppid=1988 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:00.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436353334646134363335336533356336613734633438623261613766 Sep 6 00:24:00.830000 audit: BPF prog-id=68 op=UNLOAD Sep 6 00:24:00.830000 audit: BPF prog-id=67 op=UNLOAD Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:00.830000 audit: BPF prog-id=69 op=LOAD Sep 6 00:24:00.830000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0002d9c88 items=0 ppid=1988 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:00.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436353334646134363335336533356336613734633438623261613766 Sep 6 00:24:00.979000 audit: BPF prog-id=69 op=UNLOAD Sep 6 00:24:01.089227 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940-rootfs.mount: Deactivated successfully. Sep 6 00:24:01.137549 env[1411]: time="2025-09-06T00:24:01.137503892Z" level=info msg="shim disconnected" id=d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940 Sep 6 00:24:01.137549 env[1411]: time="2025-09-06T00:24:01.137549392Z" level=warning msg="cleaning up after shim disconnected" id=d6534da46353e35c6a74c48b2aa7f8bc4a973ac7b060ad0c69fe160d2c613940 namespace=k8s.io Sep 6 00:24:01.137793 env[1411]: time="2025-09-06T00:24:01.137562492Z" level=info msg="cleaning up dead shim" Sep 6 00:24:01.146068 env[1411]: time="2025-09-06T00:24:01.146023508Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:24:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2110 runtime=io.containerd.runc.v2\n" Sep 6 00:24:01.409983 kubelet[1873]: E0906 00:24:01.409914 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:01.508115 kubelet[1873]: E0906 00:24:01.508046 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:24:02.215391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2811100583.mount: Deactivated successfully. Sep 6 00:24:02.411099 kubelet[1873]: E0906 00:24:02.411033 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:02.926072 env[1411]: time="2025-09-06T00:24:02.926017178Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:02.932413 env[1411]: time="2025-09-06T00:24:02.932368089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1b2ea5e018dbbbd2efb8e5c540a6d3c463d77f250d3904429402ee057f09c64e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:02.936267 env[1411]: time="2025-09-06T00:24:02.936235195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:02.944985 env[1411]: time="2025-09-06T00:24:02.944934610Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bb04e9247da3aaeb96406b4d530a79fc865695b6807353dd1a28871df0d7f837,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:02.945373 env[1411]: time="2025-09-06T00:24:02.945339511Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\" returns image reference \"sha256:1b2ea5e018dbbbd2efb8e5c540a6d3c463d77f250d3904429402ee057f09c64e\"" Sep 6 00:24:02.947514 env[1411]: time="2025-09-06T00:24:02.947486015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 00:24:02.952935 env[1411]: time="2025-09-06T00:24:02.952732624Z" level=info msg="CreateContainer within sandbox \"bb86045055c108e74638d7447def73789f6ae5a3d5470b1a5f64d7a199937544\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 00:24:02.997720 env[1411]: time="2025-09-06T00:24:02.997670001Z" level=info msg="CreateContainer within sandbox \"bb86045055c108e74638d7447def73789f6ae5a3d5470b1a5f64d7a199937544\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e42595bdc427f1aaa3cf16186213380fb88dbc205d2e616f1413f8950da6c10d\"" Sep 6 00:24:02.998507 env[1411]: time="2025-09-06T00:24:02.998467203Z" level=info msg="StartContainer for \"e42595bdc427f1aaa3cf16186213380fb88dbc205d2e616f1413f8950da6c10d\"" Sep 6 00:24:03.025491 systemd[1]: Started cri-containerd-e42595bdc427f1aaa3cf16186213380fb88dbc205d2e616f1413f8950da6c10d.scope. Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f33d4cbcb78 items=0 ppid=2022 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323539356264633432376631616161336366313631383632313333 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit: BPF prog-id=70 op=LOAD Sep 6 00:24:03.043000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000352478 items=0 ppid=2022 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323539356264633432376631616161336366313631383632313333 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.043000 audit: BPF prog-id=71 op=LOAD Sep 6 00:24:03.043000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003524c8 items=0 ppid=2022 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323539356264633432376631616161336366313631383632313333 Sep 6 00:24:03.044000 audit: BPF prog-id=71 op=UNLOAD Sep 6 00:24:03.044000 audit: BPF prog-id=70 op=UNLOAD Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:03.044000 audit: BPF prog-id=72 op=LOAD Sep 6 00:24:03.044000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000352558 items=0 ppid=2022 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323539356264633432376631616161336366313631383632313333 Sep 6 00:24:03.068946 env[1411]: time="2025-09-06T00:24:03.068901517Z" level=info msg="StartContainer for \"e42595bdc427f1aaa3cf16186213380fb88dbc205d2e616f1413f8950da6c10d\" returns successfully" Sep 6 00:24:03.195000 audit[2197]: NETFILTER_CFG table=mangle:19 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.195000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8e9f1bc0 a2=0 a3=7ffe8e9f1bac items=0 ppid=2146 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:24:03.197000 audit[2198]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.197000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff709ed3d0 a2=0 a3=7fff709ed3bc items=0 ppid=2146 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:24:03.198000 audit[2200]: NETFILTER_CFG table=nat:21 family=10 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.198000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbc958570 a2=0 a3=7ffcbc95855c items=0 ppid=2146 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:24:03.203000 audit[2201]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.203000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb9a68e50 a2=0 a3=7ffdb9a68e3c items=0 ppid=2146 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:24:03.204000 audit[2204]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.204000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6d91f120 a2=0 a3=7ffd6d91f10c items=0 ppid=2146 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:24:03.206000 audit[2206]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.206000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec8a90cc0 a2=0 a3=7ffec8a90cac items=0 ppid=2146 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:24:03.214648 systemd[1]: run-containerd-runc-k8s.io-e42595bdc427f1aaa3cf16186213380fb88dbc205d2e616f1413f8950da6c10d-runc.sDdRSQ.mount: Deactivated successfully. Sep 6 00:24:03.302000 audit[2207]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.302000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc59b290c0 a2=0 a3=7ffc59b290ac items=0 ppid=2146 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:24:03.305000 audit[2209]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.305000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc2fe1c9c0 a2=0 a3=7ffc2fe1c9ac items=0 ppid=2146 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 00:24:03.309000 audit[2212]: NETFILTER_CFG table=filter:27 family=2 entries=2 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.309000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe7254d210 a2=0 a3=7ffe7254d1fc items=0 ppid=2146 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 00:24:03.310000 audit[2213]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.310000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefe9170e0 a2=0 a3=7ffefe9170cc items=0 ppid=2146 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:24:03.313000 audit[2215]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.313000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3d59def0 a2=0 a3=7fff3d59dedc items=0 ppid=2146 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:24:03.314000 audit[2216]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.314000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7102d410 a2=0 a3=7fff7102d3fc items=0 ppid=2146 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:24:03.317000 audit[2218]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.317000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdfca76c90 a2=0 a3=7ffdfca76c7c items=0 ppid=2146 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:24:03.321000 audit[2221]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.321000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffceb7b160 a2=0 a3=7fffceb7b14c items=0 ppid=2146 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 00:24:03.322000 audit[2222]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.322000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff662eb350 a2=0 a3=7fff662eb33c items=0 ppid=2146 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:24:03.325000 audit[2224]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.325000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf6fc70a0 a2=0 a3=7ffdf6fc708c items=0 ppid=2146 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:24:03.326000 audit[2225]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.326000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe71f8d330 a2=0 a3=7ffe71f8d31c items=0 ppid=2146 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:24:03.329000 audit[2227]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.329000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff458b4bd0 a2=0 a3=7fff458b4bbc items=0 ppid=2146 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:24:03.332000 audit[2230]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.332000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2785d5a0 a2=0 a3=7ffd2785d58c items=0 ppid=2146 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:24:03.336000 audit[2233]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.336000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8525ec10 a2=0 a3=7ffd8525ebfc items=0 ppid=2146 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:24:03.337000 audit[2234]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.337000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc95d907d0 a2=0 a3=7ffc95d907bc items=0 ppid=2146 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:24:03.340000 audit[2236]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.340000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdb1d9ecb0 a2=0 a3=7ffdb1d9ec9c items=0 ppid=2146 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:03.411797 kubelet[1873]: E0906 00:24:03.411341 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:03.414000 audit[2240]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.414000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeb0395090 a2=0 a3=7ffeb039507c items=0 ppid=2146 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:03.416000 audit[2241]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.416000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe12902710 a2=0 a3=7ffe129026fc items=0 ppid=2146 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:24:03.418000 audit[2243]: NETFILTER_CFG table=nat:43 family=2 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:24:03.418000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc905deb50 a2=0 a3=7ffc905deb3c items=0 ppid=2146 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:24:03.449000 audit[2249]: NETFILTER_CFG table=filter:44 family=2 entries=5 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:03.449000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffeb1bb5e70 a2=0 a3=7ffeb1bb5e5c items=0 ppid=2146 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:03.502000 audit[2249]: NETFILTER_CFG table=nat:45 family=2 entries=79 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:03.502000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=38092 a0=3 a1=7ffeb1bb5e70 a2=0 a3=7ffeb1bb5e5c items=0 ppid=2146 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:03.507614 kubelet[1873]: E0906 00:24:03.507242 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:24:03.547378 kubelet[1873]: I0906 00:24:03.547151 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-lz546" podStartSLOduration=5.975294841 podStartE2EDuration="9.547113391s" podCreationTimestamp="2025-09-06 00:23:54 +0000 UTC" firstStartedPulling="2025-09-06 00:23:59.374515063 +0000 UTC m=+5.943782203" lastFinishedPulling="2025-09-06 00:24:02.946333513 +0000 UTC m=+9.515600753" observedRunningTime="2025-09-06 00:24:03.54707409 +0000 UTC m=+10.116341330" watchObservedRunningTime="2025-09-06 00:24:03.547113391 +0000 UTC m=+10.116380531" Sep 6 00:24:03.555000 audit[2257]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.555000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc77198420 a2=0 a3=7ffc7719840c items=0 ppid=2146 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:24:03.561000 audit[2259]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.561000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffccab7e2e0 a2=0 a3=7ffccab7e2cc items=0 ppid=2146 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 00:24:03.565000 audit[2262]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.565000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdac8d7d70 a2=0 a3=7ffdac8d7d5c items=0 ppid=2146 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 00:24:03.567000 audit[2263]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.567000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca9e07d00 a2=0 a3=7ffca9e07cec items=0 ppid=2146 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:24:03.569000 audit[2265]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.569000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf1f9bf20 a2=0 a3=7ffcf1f9bf0c items=0 ppid=2146 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:24:03.570000 audit[2266]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.570000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaf4ffc60 a2=0 a3=7fffaf4ffc4c items=0 ppid=2146 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:24:03.573000 audit[2268]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.573000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff034b36a0 a2=0 a3=7fff034b368c items=0 ppid=2146 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 00:24:03.576000 audit[2271]: NETFILTER_CFG table=filter:53 family=10 entries=2 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.576000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc17d90a70 a2=0 a3=7ffc17d90a5c items=0 ppid=2146 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:24:03.578000 audit[2272]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.578000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1ed81930 a2=0 a3=7ffe1ed8191c items=0 ppid=2146 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:24:03.580000 audit[2274]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.580000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfa026c40 a2=0 a3=7ffcfa026c2c items=0 ppid=2146 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:24:03.581000 audit[2275]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.581000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd920daf10 a2=0 a3=7ffd920daefc items=0 ppid=2146 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:24:03.584000 audit[2277]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.584000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe7b11190 a2=0 a3=7fffe7b1117c items=0 ppid=2146 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:24:03.587000 audit[2280]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.587000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc40b2a2b0 a2=0 a3=7ffc40b2a29c items=0 ppid=2146 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:24:03.591000 audit[2283]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.591000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6db7b170 a2=0 a3=7fff6db7b15c items=0 ppid=2146 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 00:24:03.592000 audit[2284]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.592000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1731fc40 a2=0 a3=7fff1731fc2c items=0 ppid=2146 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:24:03.595000 audit[2286]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.595000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe71764bd0 a2=0 a3=7ffe71764bbc items=0 ppid=2146 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:03.598000 audit[2289]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.598000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffeff3d3d0 a2=0 a3=7fffeff3d3bc items=0 ppid=2146 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:24:03.599000 audit[2290]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.599000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9d874640 a2=0 a3=7ffc9d87462c items=0 ppid=2146 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:24:03.602000 audit[2292]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.602000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff1b48d890 a2=0 a3=7fff1b48d87c items=0 ppid=2146 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:24:03.603000 audit[2293]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.603000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed5d2c5a0 a2=0 a3=7ffed5d2c58c items=0 ppid=2146 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:24:03.606000 audit[2295]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.606000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdcff87990 a2=0 a3=7ffdcff8797c items=0 ppid=2146 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.606000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:24:03.610000 audit[2298]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:24:03.610000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3eeadbf0 a2=0 a3=7ffd3eeadbdc items=0 ppid=2146 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:24:03.613000 audit[2300]: NETFILTER_CFG table=filter:68 family=10 entries=3 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:24:03.613000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe3fbcfe30 a2=0 a3=7ffe3fbcfe1c items=0 ppid=2146 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.613000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:03.613000 audit[2300]: NETFILTER_CFG table=nat:69 family=10 entries=7 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:24:03.613000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe3fbcfe30 a2=0 a3=7ffe3fbcfe1c items=0 ppid=2146 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:03.613000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:04.412138 kubelet[1873]: E0906 00:24:04.412057 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:05.413202 kubelet[1873]: E0906 00:24:05.413109 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:05.507835 kubelet[1873]: E0906 00:24:05.507758 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:24:06.413373 kubelet[1873]: E0906 00:24:06.413314 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:06.443908 env[1411]: time="2025-09-06T00:24:06.443837554Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:06.457624 env[1411]: time="2025-09-06T00:24:06.457566772Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:06.462483 env[1411]: time="2025-09-06T00:24:06.462443378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:06.467053 env[1411]: time="2025-09-06T00:24:06.467018884Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:06.467521 env[1411]: time="2025-09-06T00:24:06.467487485Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 00:24:06.474514 env[1411]: time="2025-09-06T00:24:06.474481994Z" level=info msg="CreateContainer within sandbox \"2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 00:24:06.524908 env[1411]: time="2025-09-06T00:24:06.524851262Z" level=info msg="CreateContainer within sandbox \"2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42\"" Sep 6 00:24:06.525621 env[1411]: time="2025-09-06T00:24:06.525588662Z" level=info msg="StartContainer for \"9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42\"" Sep 6 00:24:06.557912 systemd[1]: Started cri-containerd-9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42.scope. Sep 6 00:24:06.590709 kernel: kauditd_printk_skb: 230 callbacks suppressed Sep 6 00:24:06.590858 kernel: audit: type=1400 audit(1757118246.570:517): avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd7442dc448 items=0 ppid=1988 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:06.614173 kernel: audit: type=1300 audit(1757118246.570:517): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd7442dc448 items=0 ppid=1988 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:06.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663763353863366437653135366236643935376463336330633934 Sep 6 00:24:06.638105 kernel: audit: type=1327 audit(1757118246.570:517): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663763353863366437653135366236643935376463336330633934 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.667413 kernel: audit: type=1400 audit(1757118246.570:518): avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.667499 kernel: audit: type=1400 audit(1757118246.570:518): avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.667525 kernel: audit: type=1400 audit(1757118246.570:518): avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.684869 kernel: audit: type=1400 audit(1757118246.570:518): avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.691443 env[1411]: time="2025-09-06T00:24:06.691405584Z" level=info msg="StartContainer for \"9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42\" returns successfully" Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.732046 kernel: audit: type=1400 audit(1757118246.570:518): avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.732127 kernel: audit: type=1400 audit(1757118246.570:518): avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.732150 kernel: audit: type=1400 audit(1757118246.570:518): avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.570000 audit: BPF prog-id=73 op=LOAD Sep 6 00:24:06.570000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000220208 items=0 ppid=1988 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:06.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663763353863366437653135366236643935376463336330633934 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.589000 audit: BPF prog-id=74 op=LOAD Sep 6 00:24:06.589000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000220258 items=0 ppid=1988 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:06.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663763353863366437653135366236643935376463336330633934 Sep 6 00:24:06.590000 audit: BPF prog-id=74 op=UNLOAD Sep 6 00:24:06.590000 audit: BPF prog-id=73 op=UNLOAD Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { perfmon } for pid=2310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit[2310]: AVC avc: denied { bpf } for pid=2310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:06.590000 audit: BPF prog-id=75 op=LOAD Sep 6 00:24:06.590000 audit[2310]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002202e8 items=0 ppid=1988 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:06.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663763353863366437653135366236643935376463336330633934 Sep 6 00:24:07.414273 kubelet[1873]: E0906 00:24:07.414229 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:07.507176 kubelet[1873]: E0906 00:24:07.507113 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:24:08.370809 env[1411]: time="2025-09-06T00:24:08.370610580Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:24:08.374534 systemd[1]: cri-containerd-9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42.scope: Deactivated successfully. Sep 6 00:24:08.376000 audit: BPF prog-id=75 op=UNLOAD Sep 6 00:24:08.393945 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42-rootfs.mount: Deactivated successfully. Sep 6 00:24:08.415586 kubelet[1873]: E0906 00:24:08.415537 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:08.472564 kubelet[1873]: I0906 00:24:08.472244 1873 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 00:24:09.416143 kubelet[1873]: E0906 00:24:09.416086 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:09.512403 systemd[1]: Created slice kubepods-besteffort-podace0bd0b_5c74_4ef2_875b_36412762cdca.slice. Sep 6 00:24:09.515144 env[1411]: time="2025-09-06T00:24:09.515100585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2vlwd,Uid:ace0bd0b-5c74-4ef2-875b-36412762cdca,Namespace:calico-system,Attempt:0,}" Sep 6 00:24:10.417183 kubelet[1873]: E0906 00:24:10.417125 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:10.426358 systemd[1]: Created slice kubepods-besteffort-podd9aaadf6_1c33_423a_80bf_d8d3aeeb0c2b.slice. Sep 6 00:24:10.456556 env[1411]: time="2025-09-06T00:24:10.455597188Z" level=info msg="shim disconnected" id=9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42 Sep 6 00:24:10.456556 env[1411]: time="2025-09-06T00:24:10.455654288Z" level=warning msg="cleaning up after shim disconnected" id=9af7c58c6d7e156b6d957dc3c0c94b328eb4781753dd750418eb303c7fed6a42 namespace=k8s.io Sep 6 00:24:10.456556 env[1411]: time="2025-09-06T00:24:10.455666288Z" level=info msg="cleaning up dead shim" Sep 6 00:24:10.461914 kubelet[1873]: I0906 00:24:10.461877 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d642f\" (UniqueName: \"kubernetes.io/projected/d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b-kube-api-access-d642f\") pod \"nginx-deployment-7fcdb87857-mnl7x\" (UID: \"d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b\") " pod="default/nginx-deployment-7fcdb87857-mnl7x" Sep 6 00:24:10.468743 env[1411]: time="2025-09-06T00:24:10.468701701Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:24:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2348 runtime=io.containerd.runc.v2\n" Sep 6 00:24:10.510576 env[1411]: time="2025-09-06T00:24:10.510506744Z" level=error msg="Failed to destroy network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.511334 env[1411]: time="2025-09-06T00:24:10.511283745Z" level=error msg="encountered an error cleaning up failed sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.511571 env[1411]: time="2025-09-06T00:24:10.511527345Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2vlwd,Uid:ace0bd0b-5c74-4ef2-875b-36412762cdca,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.512482 kubelet[1873]: E0906 00:24:10.511864 1873 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.512482 kubelet[1873]: E0906 00:24:10.511956 1873 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2vlwd" Sep 6 00:24:10.512482 kubelet[1873]: E0906 00:24:10.512001 1873 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2vlwd" Sep 6 00:24:10.512703 kubelet[1873]: E0906 00:24:10.512084 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2vlwd_calico-system(ace0bd0b-5c74-4ef2-875b-36412762cdca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2vlwd_calico-system(ace0bd0b-5c74-4ef2-875b-36412762cdca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:24:10.513061 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51-shm.mount: Deactivated successfully. Sep 6 00:24:10.555164 env[1411]: time="2025-09-06T00:24:10.555112590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 00:24:10.555730 kubelet[1873]: I0906 00:24:10.555703 1873 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:10.557049 env[1411]: time="2025-09-06T00:24:10.557013692Z" level=info msg="StopPodSandbox for \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\"" Sep 6 00:24:10.596872 env[1411]: time="2025-09-06T00:24:10.596808433Z" level=error msg="StopPodSandbox for \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\" failed" error="failed to destroy network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.597100 kubelet[1873]: E0906 00:24:10.597057 1873 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:10.597188 kubelet[1873]: E0906 00:24:10.597125 1873 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51"} Sep 6 00:24:10.597237 kubelet[1873]: E0906 00:24:10.597189 1873 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ace0bd0b-5c74-4ef2-875b-36412762cdca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:24:10.597321 kubelet[1873]: E0906 00:24:10.597221 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ace0bd0b-5c74-4ef2-875b-36412762cdca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2vlwd" podUID="ace0bd0b-5c74-4ef2-875b-36412762cdca" Sep 6 00:24:10.739582 env[1411]: time="2025-09-06T00:24:10.738642079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mnl7x,Uid:d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b,Namespace:default,Attempt:0,}" Sep 6 00:24:10.831711 env[1411]: time="2025-09-06T00:24:10.831557075Z" level=error msg="Failed to destroy network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.831984 env[1411]: time="2025-09-06T00:24:10.831932875Z" level=error msg="encountered an error cleaning up failed sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.832092 env[1411]: time="2025-09-06T00:24:10.832032275Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mnl7x,Uid:d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.832686 kubelet[1873]: E0906 00:24:10.832336 1873 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:10.832686 kubelet[1873]: E0906 00:24:10.832428 1873 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-mnl7x" Sep 6 00:24:10.832686 kubelet[1873]: E0906 00:24:10.832467 1873 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-mnl7x" Sep 6 00:24:10.832893 kubelet[1873]: E0906 00:24:10.832560 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-mnl7x_default(d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-mnl7x_default(d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-mnl7x" podUID="d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b" Sep 6 00:24:11.417340 kubelet[1873]: E0906 00:24:11.417279 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:11.450857 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6-shm.mount: Deactivated successfully. Sep 6 00:24:11.558772 kubelet[1873]: I0906 00:24:11.558742 1873 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:11.559500 env[1411]: time="2025-09-06T00:24:11.559415060Z" level=info msg="StopPodSandbox for \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\"" Sep 6 00:24:11.618266 env[1411]: time="2025-09-06T00:24:11.618181317Z" level=error msg="StopPodSandbox for \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\" failed" error="failed to destroy network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:24:11.618522 kubelet[1873]: E0906 00:24:11.618469 1873 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:11.618636 kubelet[1873]: E0906 00:24:11.618542 1873 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6"} Sep 6 00:24:11.618636 kubelet[1873]: E0906 00:24:11.618589 1873 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:24:11.618636 kubelet[1873]: E0906 00:24:11.618623 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-mnl7x" podUID="d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b" Sep 6 00:24:12.418422 kubelet[1873]: E0906 00:24:12.418339 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:13.418636 kubelet[1873]: E0906 00:24:13.418566 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:14.397200 kubelet[1873]: E0906 00:24:14.397129 1873 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:14.418772 kubelet[1873]: E0906 00:24:14.418697 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:15.419726 kubelet[1873]: E0906 00:24:15.419672 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:16.420129 kubelet[1873]: E0906 00:24:16.420050 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:16.969552 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3749808561.mount: Deactivated successfully. Sep 6 00:24:17.011103 env[1411]: time="2025-09-06T00:24:17.011046920Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:17.019610 env[1411]: time="2025-09-06T00:24:17.019556246Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:17.023694 env[1411]: time="2025-09-06T00:24:17.023651154Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:17.028139 env[1411]: time="2025-09-06T00:24:17.028102572Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:17.028521 env[1411]: time="2025-09-06T00:24:17.028488383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 00:24:17.050491 env[1411]: time="2025-09-06T00:24:17.050454666Z" level=info msg="CreateContainer within sandbox \"2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 00:24:17.085924 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3270340913.mount: Deactivated successfully. Sep 6 00:24:17.101071 env[1411]: time="2025-09-06T00:24:17.101027309Z" level=info msg="CreateContainer within sandbox \"2487e2aac4f012a719e520dd43be0f228c9337c96f51071f202f0831b6b8e1a4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"98db9563a3a2d637be75e8ff38efae2294ddd1039ed5458ebb423bbebcfbdaab\"" Sep 6 00:24:17.101743 env[1411]: time="2025-09-06T00:24:17.101710627Z" level=info msg="StartContainer for \"98db9563a3a2d637be75e8ff38efae2294ddd1039ed5458ebb423bbebcfbdaab\"" Sep 6 00:24:17.119834 systemd[1]: Started cri-containerd-98db9563a3a2d637be75e8ff38efae2294ddd1039ed5458ebb423bbebcfbdaab.scope. Sep 6 00:24:17.159599 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 00:24:17.159790 kernel: audit: type=1400 audit(1757118257.138:524): avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f3c754202f8 items=0 ppid=1988 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:17.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646239353633613361326436333762653735653866663338656661 Sep 6 00:24:17.205925 kernel: audit: type=1300 audit(1757118257.138:524): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f3c754202f8 items=0 ppid=1988 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:17.206003 kernel: audit: type=1327 audit(1757118257.138:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646239353633613361326436333762653735653866663338656661 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.222211 kernel: audit: type=1400 audit(1757118257.138:525): avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.255493 kernel: audit: type=1400 audit(1757118257.138:525): avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.255594 kernel: audit: type=1400 audit(1757118257.138:525): avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.273850 kernel: audit: type=1400 audit(1757118257.138:525): avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.289753 kernel: audit: type=1400 audit(1757118257.138:525): avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.291546 env[1411]: time="2025-09-06T00:24:17.291504166Z" level=info msg="StartContainer for \"98db9563a3a2d637be75e8ff38efae2294ddd1039ed5458ebb423bbebcfbdaab\" returns successfully" Sep 6 00:24:17.308991 kernel: audit: type=1400 audit(1757118257.138:525): avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.309111 kernel: audit: type=1400 audit(1757118257.138:525): avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.138000 audit: BPF prog-id=76 op=LOAD Sep 6 00:24:17.138000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000024f38 items=0 ppid=1988 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:17.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646239353633613361326436333762653735653866663338656661 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit: BPF prog-id=77 op=LOAD Sep 6 00:24:17.158000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000024f88 items=0 ppid=1988 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:17.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646239353633613361326436333762653735653866663338656661 Sep 6 00:24:17.158000 audit: BPF prog-id=77 op=UNLOAD Sep 6 00:24:17.158000 audit: BPF prog-id=76 op=UNLOAD Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:17.158000 audit: BPF prog-id=78 op=LOAD Sep 6 00:24:17.158000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000025018 items=0 ppid=1988 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:17.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938646239353633613361326436333762653735653866663338656661 Sep 6 00:24:17.421029 kubelet[1873]: E0906 00:24:17.420938 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:17.488113 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 00:24:17.488290 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 00:24:17.592290 kubelet[1873]: I0906 00:24:17.592216 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rhchv" podStartSLOduration=5.863221945 podStartE2EDuration="23.592197049s" podCreationTimestamp="2025-09-06 00:23:54 +0000 UTC" firstStartedPulling="2025-09-06 00:23:59.300660109 +0000 UTC m=+5.869927249" lastFinishedPulling="2025-09-06 00:24:17.029635213 +0000 UTC m=+23.598902353" observedRunningTime="2025-09-06 00:24:17.591822339 +0000 UTC m=+24.161089579" watchObservedRunningTime="2025-09-06 00:24:17.592197049 +0000 UTC m=+24.161464289" Sep 6 00:24:18.422005 kubelet[1873]: E0906 00:24:18.421874 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:18.603301 systemd[1]: run-containerd-runc-k8s.io-98db9563a3a2d637be75e8ff38efae2294ddd1039ed5458ebb423bbebcfbdaab-runc.eoNXrj.mount: Deactivated successfully. Sep 6 00:24:18.806000 audit[2593]: AVC avc: denied { write } for pid=2593 comm="tee" name="fd" dev="proc" ino=23390 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:18.806000 audit[2593]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff215757dc a2=241 a3=1b6 items=1 ppid=2564 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.806000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 00:24:18.806000 audit: PATH item=0 name="/dev/fd/63" inode=23386 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:18.806000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:18.810000 audit[2587]: AVC avc: denied { write } for pid=2587 comm="tee" name="fd" dev="proc" ino=22482 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:18.812000 audit[2596]: AVC avc: denied { write } for pid=2596 comm="tee" name="fd" dev="proc" ino=23398 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:18.812000 audit[2596]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef60987de a2=241 a3=1b6 items=1 ppid=2567 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.812000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 00:24:18.812000 audit: PATH item=0 name="/dev/fd/63" inode=23387 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:18.812000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:18.814000 audit[2591]: AVC avc: denied { write } for pid=2591 comm="tee" name="fd" dev="proc" ino=23402 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:18.814000 audit[2591]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9d82d7dd a2=241 a3=1b6 items=1 ppid=2558 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.814000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 00:24:18.814000 audit: PATH item=0 name="/dev/fd/63" inode=22473 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:18.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:18.810000 audit[2587]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc443827cc a2=241 a3=1b6 items=1 ppid=2559 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.810000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 00:24:18.810000 audit: PATH item=0 name="/dev/fd/63" inode=22466 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:18.810000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:18.823000 audit[2606]: AVC avc: denied { write } for pid=2606 comm="tee" name="fd" dev="proc" ino=22491 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:18.823000 audit[2606]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd61a5d7dc a2=241 a3=1b6 items=1 ppid=2566 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.823000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 00:24:18.823000 audit: PATH item=0 name="/dev/fd/63" inode=23394 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:18.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:18.837000 audit[2609]: AVC avc: denied { write } for pid=2609 comm="tee" name="fd" dev="proc" ino=22499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:18.837000 audit[2609]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcaf5847cd a2=241 a3=1b6 items=1 ppid=2571 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.837000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 00:24:18.837000 audit: PATH item=0 name="/dev/fd/63" inode=23395 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:18.837000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:18.846000 audit[2622]: AVC avc: denied { write } for pid=2622 comm="tee" name="fd" dev="proc" ino=22504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:24:18.846000 audit[2622]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6d08f7dc a2=241 a3=1b6 items=1 ppid=2576 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:18.846000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 00:24:18.846000 audit: PATH item=0 name="/dev/fd/63" inode=22494 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:24:18.846000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.108000 audit: BPF prog-id=79 op=LOAD Sep 6 00:24:19.108000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff47a26470 a2=98 a3=1fffffffffffffff items=0 ppid=2582 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.108000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:19.110000 audit: BPF prog-id=79 op=UNLOAD Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit: BPF prog-id=80 op=LOAD Sep 6 00:24:19.110000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff47a26350 a2=94 a3=3 items=0 ppid=2582 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.110000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:19.110000 audit: BPF prog-id=80 op=UNLOAD Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.110000 audit: BPF prog-id=81 op=LOAD Sep 6 00:24:19.110000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff47a26390 a2=94 a3=7fff47a26570 items=0 ppid=2582 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.110000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:19.111000 audit: BPF prog-id=81 op=UNLOAD Sep 6 00:24:19.111000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.111000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff47a26460 a2=50 a3=a000000085 items=0 ppid=2582 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.111000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.112000 audit: BPF prog-id=82 op=LOAD Sep 6 00:24:19.112000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd284f1790 a2=98 a3=3 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.112000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.113000 audit: BPF prog-id=82 op=UNLOAD Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit: BPF prog-id=83 op=LOAD Sep 6 00:24:19.113000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd284f1580 a2=94 a3=54428f items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.113000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.113000 audit: BPF prog-id=83 op=UNLOAD Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.113000 audit: BPF prog-id=84 op=LOAD Sep 6 00:24:19.113000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd284f15b0 a2=94 a3=2 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.113000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.113000 audit: BPF prog-id=84 op=UNLOAD Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.229000 audit: BPF prog-id=85 op=LOAD Sep 6 00:24:19.229000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd284f1470 a2=94 a3=1 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.229000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.230000 audit: BPF prog-id=85 op=UNLOAD Sep 6 00:24:19.230000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.230000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd284f1540 a2=50 a3=7ffd284f1620 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.230000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.239000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.239000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd284f1480 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.239000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.239000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd284f14b0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd284f13c0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd284f14d0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd284f14b0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd284f14a0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd284f14d0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd284f14b0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd284f14d0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd284f14a0 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd284f1510 a2=28 a3=0 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd284f12c0 a2=50 a3=1 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit: BPF prog-id=86 op=LOAD Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd284f12c0 a2=94 a3=5 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit: BPF prog-id=86 op=UNLOAD Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd284f1370 a2=50 a3=1 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd284f1490 a2=4 a3=38 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.240000 audit[2665]: AVC avc: denied { confidentiality } for pid=2665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:19.240000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd284f14e0 a2=94 a3=6 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { confidentiality } for pid=2665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:19.241000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd284f0c90 a2=94 a3=88 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.241000 audit[2665]: AVC avc: denied { confidentiality } for pid=2665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:19.241000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd284f0c90 a2=94 a3=88 items=0 ppid=2582 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit: BPF prog-id=87 op=LOAD Sep 6 00:24:19.250000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffde1646650 a2=98 a3=1999999999999999 items=0 ppid=2582 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.250000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:24:19.250000 audit: BPF prog-id=87 op=UNLOAD Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.250000 audit: BPF prog-id=88 op=LOAD Sep 6 00:24:19.250000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffde1646530 a2=94 a3=ffff items=0 ppid=2582 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.250000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:24:19.251000 audit: BPF prog-id=88 op=UNLOAD Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.251000 audit: BPF prog-id=89 op=LOAD Sep 6 00:24:19.251000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffde1646570 a2=94 a3=7ffde1646750 items=0 ppid=2582 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.251000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:24:19.251000 audit: BPF prog-id=89 op=UNLOAD Sep 6 00:24:19.376931 systemd-networkd[1567]: vxlan.calico: Link UP Sep 6 00:24:19.376946 systemd-networkd[1567]: vxlan.calico: Gained carrier Sep 6 00:24:19.422592 kubelet[1873]: E0906 00:24:19.422536 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit: BPF prog-id=90 op=LOAD Sep 6 00:24:19.437000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe92a19f40 a2=98 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.437000 audit: BPF prog-id=90 op=UNLOAD Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.437000 audit: BPF prog-id=91 op=LOAD Sep 6 00:24:19.437000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe92a19d50 a2=94 a3=54428f items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit: BPF prog-id=91 op=UNLOAD Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit: BPF prog-id=92 op=LOAD Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe92a19d80 a2=94 a3=2 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit: BPF prog-id=92 op=UNLOAD Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe92a19c50 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe92a19c80 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe92a19b90 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe92a19ca0 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe92a19c80 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe92a19c70 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe92a19ca0 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe92a19c80 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe92a19ca0 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe92a19c70 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe92a19ce0 a2=28 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.438000 audit: BPF prog-id=93 op=LOAD Sep 6 00:24:19.438000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe92a19b50 a2=94 a3=0 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.438000 audit: BPF prog-id=93 op=UNLOAD Sep 6 00:24:19.439000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.439000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe92a19b40 a2=50 a3=2800 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.439000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe92a19b40 a2=50 a3=2800 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.441000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit: BPF prog-id=94 op=LOAD Sep 6 00:24:19.441000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe92a19360 a2=94 a3=2 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.441000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.441000 audit: BPF prog-id=94 op=UNLOAD Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.441000 audit: BPF prog-id=95 op=LOAD Sep 6 00:24:19.441000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe92a19460 a2=94 a3=30 items=0 ppid=2582 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.441000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.444000 audit: BPF prog-id=96 op=LOAD Sep 6 00:24:19.444000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda7bacc00 a2=98 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.447000 audit: BPF prog-id=96 op=UNLOAD Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit: BPF prog-id=97 op=LOAD Sep 6 00:24:19.447000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda7bac9f0 a2=94 a3=54428f items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.447000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.447000 audit: BPF prog-id=97 op=UNLOAD Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.447000 audit: BPF prog-id=98 op=LOAD Sep 6 00:24:19.447000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda7baca20 a2=94 a3=2 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.447000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.447000 audit: BPF prog-id=98 op=UNLOAD Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit: BPF prog-id=99 op=LOAD Sep 6 00:24:19.577000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda7bac8e0 a2=94 a3=1 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.577000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.577000 audit: BPF prog-id=99 op=UNLOAD Sep 6 00:24:19.577000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.577000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffda7bac9b0 a2=50 a3=7ffda7baca90 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.577000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda7bac8f0 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda7bac920 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda7bac830 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda7bac940 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda7bac920 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda7bac910 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda7bac940 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda7bac920 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda7bac940 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda7bac910 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.587000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.587000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda7bac980 a2=28 a3=0 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda7bac730 a2=50 a3=1 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit: BPF prog-id=100 op=LOAD Sep 6 00:24:19.588000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda7bac730 a2=94 a3=5 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.588000 audit: BPF prog-id=100 op=UNLOAD Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda7bac7e0 a2=50 a3=1 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffda7bac900 a2=4 a3=38 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { confidentiality } for pid=2698 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:19.588000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda7bac950 a2=94 a3=6 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.588000 audit[2698]: AVC avc: denied { confidentiality } for pid=2698 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:24:19.588000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda7bac100 a2=94 a3=88 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda7bac100 a2=94 a3=88 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda7badb30 a2=10 a3=f8f00800 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda7bad9d0 a2=10 a3=3 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda7bad970 a2=10 a3=3 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.589000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:19.589000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda7bad970 a2=10 a3=7 items=0 ppid=2582 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:24:19.596000 audit: BPF prog-id=95 op=UNLOAD Sep 6 00:24:19.732000 audit[2724]: NETFILTER_CFG table=mangle:70 family=2 entries=16 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:19.732000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe7ddff720 a2=0 a3=7ffe7ddff70c items=0 ppid=2582 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:19.746000 audit[2723]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:19.746000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff7e6cf4e0 a2=0 a3=7fff7e6cf4cc items=0 ppid=2582 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.746000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:19.749000 audit[2722]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:19.749000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd2d24f4f0 a2=0 a3=7ffd2d24f4dc items=0 ppid=2582 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.749000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:19.755000 audit[2725]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:19.755000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcbaa62e00 a2=0 a3=7ffcbaa62dec items=0 ppid=2582 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:19.755000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:20.423269 kubelet[1873]: E0906 00:24:20.423202 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:20.988182 systemd-networkd[1567]: vxlan.calico: Gained IPv6LL Sep 6 00:24:21.424159 kubelet[1873]: E0906 00:24:21.424099 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:21.508655 env[1411]: time="2025-09-06T00:24:21.508337283Z" level=info msg="StopPodSandbox for \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\"" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.553 [INFO][2746] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.554 [INFO][2746] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" iface="eth0" netns="/var/run/netns/cni-112b24aa-df5a-2f62-e77c-afe21eefbd8e" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.554 [INFO][2746] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" iface="eth0" netns="/var/run/netns/cni-112b24aa-df5a-2f62-e77c-afe21eefbd8e" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.554 [INFO][2746] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" iface="eth0" netns="/var/run/netns/cni-112b24aa-df5a-2f62-e77c-afe21eefbd8e" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.554 [INFO][2746] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.555 [INFO][2746] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.575 [INFO][2753] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.575 [INFO][2753] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.575 [INFO][2753] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.582 [WARNING][2753] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.582 [INFO][2753] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.584 [INFO][2753] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:21.587820 env[1411]: 2025-09-06 00:24:21.586 [INFO][2746] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:21.592634 env[1411]: time="2025-09-06T00:24:21.588490589Z" level=info msg="TearDown network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\" successfully" Sep 6 00:24:21.592634 env[1411]: time="2025-09-06T00:24:21.588544591Z" level=info msg="StopPodSandbox for \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\" returns successfully" Sep 6 00:24:21.592634 env[1411]: time="2025-09-06T00:24:21.589508114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2vlwd,Uid:ace0bd0b-5c74-4ef2-875b-36412762cdca,Namespace:calico-system,Attempt:1,}" Sep 6 00:24:21.590441 systemd[1]: run-netns-cni\x2d112b24aa\x2ddf5a\x2d2f62\x2de77c\x2dafe21eefbd8e.mount: Deactivated successfully. Sep 6 00:24:21.750390 systemd-networkd[1567]: cali378c1612ea2: Link UP Sep 6 00:24:21.754868 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:24:21.754997 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali378c1612ea2: link becomes ready Sep 6 00:24:21.755387 systemd-networkd[1567]: cali378c1612ea2: Gained carrier Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.675 [INFO][2760] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.21-k8s-csi--node--driver--2vlwd-eth0 csi-node-driver- calico-system ace0bd0b-5c74-4ef2-875b-36412762cdca 1419 0 2025-09-06 00:23:54 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.21 csi-node-driver-2vlwd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali378c1612ea2 [] [] }} ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.675 [INFO][2760] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.699 [INFO][2771] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" HandleID="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.699 [INFO][2771] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" HandleID="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.21", "pod":"csi-node-driver-2vlwd", "timestamp":"2025-09-06 00:24:21.699277725 +0000 UTC"}, Hostname:"10.200.8.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.699 [INFO][2771] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.699 [INFO][2771] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.699 [INFO][2771] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.21' Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.707 [INFO][2771] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.712 [INFO][2771] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.716 [INFO][2771] ipam/ipam.go 511: Trying affinity for 192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.718 [INFO][2771] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.720 [INFO][2771] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.720 [INFO][2771] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.64/26 handle="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.721 [INFO][2771] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71 Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.728 [INFO][2771] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.64/26 handle="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.738 [INFO][2771] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.65/26] block=192.168.122.64/26 handle="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.738 [INFO][2771] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.65/26] handle="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" host="10.200.8.21" Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.738 [INFO][2771] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:21.770246 env[1411]: 2025-09-06 00:24:21.738 [INFO][2771] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.65/26] IPv6=[] ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" HandleID="k8s-pod-network.22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.771461 env[1411]: 2025-09-06 00:24:21.740 [INFO][2760] cni-plugin/k8s.go 418: Populated endpoint ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-csi--node--driver--2vlwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ace0bd0b-5c74-4ef2-875b-36412762cdca", ResourceVersion:"1419", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"", Pod:"csi-node-driver-2vlwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali378c1612ea2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:21.771461 env[1411]: 2025-09-06 00:24:21.740 [INFO][2760] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.65/32] ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.771461 env[1411]: 2025-09-06 00:24:21.740 [INFO][2760] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali378c1612ea2 ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.771461 env[1411]: 2025-09-06 00:24:21.756 [INFO][2760] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.771461 env[1411]: 2025-09-06 00:24:21.756 [INFO][2760] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-csi--node--driver--2vlwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ace0bd0b-5c74-4ef2-875b-36412762cdca", ResourceVersion:"1419", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71", Pod:"csi-node-driver-2vlwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali378c1612ea2", MAC:"16:e5:f8:68:07:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:21.771461 env[1411]: 2025-09-06 00:24:21.767 [INFO][2760] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71" Namespace="calico-system" Pod="csi-node-driver-2vlwd" WorkloadEndpoint="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:21.789899 env[1411]: time="2025-09-06T00:24:21.789714976Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:21.789899 env[1411]: time="2025-09-06T00:24:21.789762077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:21.789899 env[1411]: time="2025-09-06T00:24:21.789772478Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:21.797024 env[1411]: time="2025-09-06T00:24:21.789934582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71 pid=2797 runtime=io.containerd.runc.v2 Sep 6 00:24:21.820237 systemd[1]: Started cri-containerd-22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71.scope. Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.829000 audit: BPF prog-id=101 op=LOAD Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2797 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323536613036396137653735363564336166383465623533356132 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2797 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323536613036396137653735363564336166383465623533356132 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit: BPF prog-id=102 op=LOAD Sep 6 00:24:21.830000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00021c840 items=0 ppid=2797 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323536613036396137653735363564336166383465623533356132 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit: BPF prog-id=103 op=LOAD Sep 6 00:24:21.830000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00021c888 items=0 ppid=2797 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323536613036396137653735363564336166383465623533356132 Sep 6 00:24:21.830000 audit: BPF prog-id=103 op=UNLOAD Sep 6 00:24:21.830000 audit: BPF prog-id=102 op=UNLOAD Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:21.830000 audit: BPF prog-id=104 op=LOAD Sep 6 00:24:21.830000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00021cc98 items=0 ppid=2797 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323536613036396137653735363564336166383465623533356132 Sep 6 00:24:21.801000 audit[2786]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:21.801000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffc0dfda3e0 a2=0 a3=7ffc0dfda3cc items=0 ppid=2582 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:21.801000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:21.849016 env[1411]: time="2025-09-06T00:24:21.848947285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2vlwd,Uid:ace0bd0b-5c74-4ef2-875b-36412762cdca,Namespace:calico-system,Attempt:1,} returns sandbox id \"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71\"" Sep 6 00:24:21.850898 env[1411]: time="2025-09-06T00:24:21.850868631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 00:24:22.424815 kubelet[1873]: E0906 00:24:22.424766 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:22.508838 env[1411]: time="2025-09-06T00:24:22.508775760Z" level=info msg="StopPodSandbox for \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\"" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.551 [INFO][2843] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.551 [INFO][2843] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" iface="eth0" netns="/var/run/netns/cni-62e23e57-500e-3784-ed6c-0b96eee538ed" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.551 [INFO][2843] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" iface="eth0" netns="/var/run/netns/cni-62e23e57-500e-3784-ed6c-0b96eee538ed" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.551 [INFO][2843] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" iface="eth0" netns="/var/run/netns/cni-62e23e57-500e-3784-ed6c-0b96eee538ed" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.551 [INFO][2843] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.551 [INFO][2843] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.574 [INFO][2850] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.575 [INFO][2850] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.575 [INFO][2850] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.584 [WARNING][2850] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.584 [INFO][2850] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.585 [INFO][2850] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:22.587975 env[1411]: 2025-09-06 00:24:22.586 [INFO][2843] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:22.593332 env[1411]: time="2025-09-06T00:24:22.590158245Z" level=info msg="TearDown network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\" successfully" Sep 6 00:24:22.593332 env[1411]: time="2025-09-06T00:24:22.590202346Z" level=info msg="StopPodSandbox for \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\" returns successfully" Sep 6 00:24:22.593332 env[1411]: time="2025-09-06T00:24:22.590848661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mnl7x,Uid:d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b,Namespace:default,Attempt:1,}" Sep 6 00:24:22.592361 systemd[1]: run-netns-cni\x2d62e23e57\x2d500e\x2d3784\x2ded6c\x2d0b96eee538ed.mount: Deactivated successfully. Sep 6 00:24:22.753431 systemd-networkd[1567]: cali3fd99e1b667: Link UP Sep 6 00:24:22.760001 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:24:22.768080 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3fd99e1b667: link becomes ready Sep 6 00:24:22.769822 systemd-networkd[1567]: cali3fd99e1b667: Gained carrier Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.676 [INFO][2856] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0 nginx-deployment-7fcdb87857- default d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b 1426 0 2025-09-06 00:24:10 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.21 nginx-deployment-7fcdb87857-mnl7x eth0 default [] [] [kns.default ksa.default.default] cali3fd99e1b667 [] [] }} ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.676 [INFO][2856] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.703 [INFO][2871] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" HandleID="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.703 [INFO][2871] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" HandleID="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.21", "pod":"nginx-deployment-7fcdb87857-mnl7x", "timestamp":"2025-09-06 00:24:22.703613271 +0000 UTC"}, Hostname:"10.200.8.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.703 [INFO][2871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.703 [INFO][2871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.704 [INFO][2871] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.21' Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.711 [INFO][2871] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.715 [INFO][2871] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.722 [INFO][2871] ipam/ipam.go 511: Trying affinity for 192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.729 [INFO][2871] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.731 [INFO][2871] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.731 [INFO][2871] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.64/26 handle="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.733 [INFO][2871] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313 Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.740 [INFO][2871] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.64/26 handle="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.747 [INFO][2871] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.66/26] block=192.168.122.64/26 handle="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.747 [INFO][2871] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.66/26] handle="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" host="10.200.8.21" Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.747 [INFO][2871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:22.783806 env[1411]: 2025-09-06 00:24:22.747 [INFO][2871] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.66/26] IPv6=[] ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" HandleID="k8s-pod-network.002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.784760 env[1411]: 2025-09-06 00:24:22.749 [INFO][2856] cni-plugin/k8s.go 418: Populated endpoint ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b", ResourceVersion:"1426", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-mnl7x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3fd99e1b667", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:22.784760 env[1411]: 2025-09-06 00:24:22.749 [INFO][2856] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.66/32] ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.784760 env[1411]: 2025-09-06 00:24:22.749 [INFO][2856] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3fd99e1b667 ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.784760 env[1411]: 2025-09-06 00:24:22.769 [INFO][2856] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.784760 env[1411]: 2025-09-06 00:24:22.769 [INFO][2856] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b", ResourceVersion:"1426", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313", Pod:"nginx-deployment-7fcdb87857-mnl7x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3fd99e1b667", MAC:"96:9d:84:03:d5:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:22.784760 env[1411]: 2025-09-06 00:24:22.779 [INFO][2856] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313" Namespace="default" Pod="nginx-deployment-7fcdb87857-mnl7x" WorkloadEndpoint="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:22.793000 audit[2886]: NETFILTER_CFG table=filter:75 family=2 entries=42 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:22.799276 kernel: kauditd_printk_skb: 656 callbacks suppressed Sep 6 00:24:22.799348 kernel: audit: type=1325 audit(1757118262.793:658): table=filter:75 family=2 entries=42 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:22.808740 env[1411]: time="2025-09-06T00:24:22.808681804Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:22.808944 env[1411]: time="2025-09-06T00:24:22.808922509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:22.809072 env[1411]: time="2025-09-06T00:24:22.809050012Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:22.809361 env[1411]: time="2025-09-06T00:24:22.809323718Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313 pid=2893 runtime=io.containerd.runc.v2 Sep 6 00:24:22.793000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffed2e0b1b0 a2=0 a3=7ffed2e0b19c items=0 ppid=2582 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.836086 systemd[1]: Started cri-containerd-002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313.scope. Sep 6 00:24:22.845103 kernel: audit: type=1300 audit(1757118262.793:658): arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffed2e0b1b0 a2=0 a3=7ffed2e0b19c items=0 ppid=2582 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.845215 kernel: audit: type=1327 audit(1757118262.793:658): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:22.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.891091 kernel: audit: type=1400 audit(1757118262.874:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.907024 kernel: audit: type=1400 audit(1757118262.874:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.938479 kernel: audit: type=1400 audit(1757118262.874:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.938649 kernel: audit: type=1400 audit(1757118262.874:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.955526 kernel: audit: type=1400 audit(1757118262.874:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.994262 kernel: audit: type=1400 audit(1757118262.874:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.994437 kernel: audit: type=1400 audit(1757118262.874:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit: BPF prog-id=105 op=LOAD Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030323933353833363733306363616630646633303639393231646665 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030323933353833363733306363616630646633303639393231646665 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.890000 audit: BPF prog-id=106 op=LOAD Sep 6 00:24:22.890000 audit[2903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000389e80 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030323933353833363733306363616630646633303639393231646665 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.905000 audit: BPF prog-id=107 op=LOAD Sep 6 00:24:22.905000 audit[2903]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000296a88 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030323933353833363733306363616630646633303639393231646665 Sep 6 00:24:22.905000 audit: BPF prog-id=107 op=UNLOAD Sep 6 00:24:22.906000 audit: BPF prog-id=106 op=UNLOAD Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:22.906000 audit: BPF prog-id=108 op=LOAD Sep 6 00:24:22.906000 audit[2903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000296e98 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:22.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030323933353833363733306363616630646633303639393231646665 Sep 6 00:24:23.003685 env[1411]: time="2025-09-06T00:24:23.003629715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-mnl7x,Uid:d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b,Namespace:default,Attempt:1,} returns sandbox id \"002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313\"" Sep 6 00:24:23.285601 env[1411]: time="2025-09-06T00:24:23.285544868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:23.294034 env[1411]: time="2025-09-06T00:24:23.293990358Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:23.299029 env[1411]: time="2025-09-06T00:24:23.298994771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:23.302985 env[1411]: time="2025-09-06T00:24:23.302935460Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:23.303509 env[1411]: time="2025-09-06T00:24:23.303472972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 00:24:23.305333 env[1411]: time="2025-09-06T00:24:23.305199611Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:24:23.312139 env[1411]: time="2025-09-06T00:24:23.312102066Z" level=info msg="CreateContainer within sandbox \"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 00:24:23.371265 env[1411]: time="2025-09-06T00:24:23.371202798Z" level=info msg="CreateContainer within sandbox \"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2ae5b48b0dabd1079e1fd06a016e93b6d2f1be1f2970653c347bc8546014a530\"" Sep 6 00:24:23.372048 env[1411]: time="2025-09-06T00:24:23.371870513Z" level=info msg="StartContainer for \"2ae5b48b0dabd1079e1fd06a016e93b6d2f1be1f2970653c347bc8546014a530\"" Sep 6 00:24:23.390100 systemd[1]: Started cri-containerd-2ae5b48b0dabd1079e1fd06a016e93b6d2f1be1f2970653c347bc8546014a530.scope. Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0d180b54e8 items=0 ppid=2797 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653562343862306461626431303739653166643036613031366539 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit: BPF prog-id=109 op=LOAD Sep 6 00:24:23.406000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000368118 items=0 ppid=2797 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653562343862306461626431303739653166643036613031366539 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.406000 audit: BPF prog-id=110 op=LOAD Sep 6 00:24:23.406000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000368168 items=0 ppid=2797 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653562343862306461626431303739653166643036613031366539 Sep 6 00:24:23.407000 audit: BPF prog-id=110 op=UNLOAD Sep 6 00:24:23.407000 audit: BPF prog-id=109 op=UNLOAD Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:23.407000 audit: BPF prog-id=111 op=LOAD Sep 6 00:24:23.407000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003681f8 items=0 ppid=2797 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:23.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653562343862306461626431303739653166643036613031366539 Sep 6 00:24:23.425162 kubelet[1873]: E0906 00:24:23.425086 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:23.426681 env[1411]: time="2025-09-06T00:24:23.426633147Z" level=info msg="StartContainer for \"2ae5b48b0dabd1079e1fd06a016e93b6d2f1be1f2970653c347bc8546014a530\" returns successfully" Sep 6 00:24:23.612152 systemd-networkd[1567]: cali378c1612ea2: Gained IPv6LL Sep 6 00:24:24.252179 systemd-networkd[1567]: cali3fd99e1b667: Gained IPv6LL Sep 6 00:24:24.425722 kubelet[1873]: E0906 00:24:24.425672 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:25.426201 kubelet[1873]: E0906 00:24:25.426113 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:26.256978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2049949005.mount: Deactivated successfully. Sep 6 00:24:26.427116 kubelet[1873]: E0906 00:24:26.427035 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:27.427889 kubelet[1873]: E0906 00:24:27.427806 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:27.831704 env[1411]: time="2025-09-06T00:24:27.831644403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:27.838058 env[1411]: time="2025-09-06T00:24:27.838020032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:27.842375 env[1411]: time="2025-09-06T00:24:27.842339920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:27.846980 env[1411]: time="2025-09-06T00:24:27.846930612Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:27.847642 env[1411]: time="2025-09-06T00:24:27.847611526Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:24:27.850006 env[1411]: time="2025-09-06T00:24:27.849979974Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 00:24:27.856680 env[1411]: time="2025-09-06T00:24:27.856638809Z" level=info msg="CreateContainer within sandbox \"002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 6 00:24:27.894091 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1769585215.mount: Deactivated successfully. Sep 6 00:24:27.907844 env[1411]: time="2025-09-06T00:24:27.907795045Z" level=info msg="CreateContainer within sandbox \"002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"d8bfb01699082552466a08b6ee5aec6aa037c16b75a883cdae87f6e84d304d07\"" Sep 6 00:24:27.908663 env[1411]: time="2025-09-06T00:24:27.908632562Z" level=info msg="StartContainer for \"d8bfb01699082552466a08b6ee5aec6aa037c16b75a883cdae87f6e84d304d07\"" Sep 6 00:24:27.933418 systemd[1]: Started cri-containerd-d8bfb01699082552466a08b6ee5aec6aa037c16b75a883cdae87f6e84d304d07.scope. Sep 6 00:24:27.969128 kernel: kauditd_printk_skb: 93 callbacks suppressed Sep 6 00:24:27.969287 kernel: audit: type=1400 audit(1757118267.945:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.999283 kernel: audit: type=1400 audit(1757118267.945:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.999451 kernel: audit: type=1400 audit(1757118267.945:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.030062 kernel: audit: type=1400 audit(1757118267.945:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.030205 kernel: audit: type=1400 audit(1757118267.945:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.030240 kernel: audit: type=1400 audit(1757118267.945:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.050201 kernel: audit: type=1400 audit(1757118267.945:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.071557 env[1411]: time="2025-09-06T00:24:28.071488825Z" level=info msg="StartContainer for \"d8bfb01699082552466a08b6ee5aec6aa037c16b75a883cdae87f6e84d304d07\" returns successfully" Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.086756 kernel: audit: type=1400 audit(1757118267.945:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.117458 kernel: audit: type=1400 audit(1757118267.945:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:28.117607 kernel: audit: type=1400 audit(1757118267.950:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit: BPF prog-id=112 op=LOAD Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2893 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438626662303136393930383235353234363661303862366565356165 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2893 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438626662303136393930383235353234363661303862366565356165 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.950000 audit: BPF prog-id=113 op=LOAD Sep 6 00:24:27.950000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000299c50 items=0 ppid=2893 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438626662303136393930383235353234363661303862366565356165 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit: BPF prog-id=114 op=LOAD Sep 6 00:24:27.965000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000299c98 items=0 ppid=2893 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438626662303136393930383235353234363661303862366565356165 Sep 6 00:24:27.965000 audit: BPF prog-id=114 op=UNLOAD Sep 6 00:24:27.965000 audit: BPF prog-id=113 op=UNLOAD Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:27.965000 audit: BPF prog-id=115 op=LOAD Sep 6 00:24:27.965000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fc0a8 items=0 ppid=2893 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:27.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438626662303136393930383235353234363661303862366565356165 Sep 6 00:24:28.428108 kubelet[1873]: E0906 00:24:28.427988 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:29.340166 env[1411]: time="2025-09-06T00:24:29.340111977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:29.347547 env[1411]: time="2025-09-06T00:24:29.347500718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:29.353170 env[1411]: time="2025-09-06T00:24:29.353135327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:29.357329 env[1411]: time="2025-09-06T00:24:29.357291907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:29.357839 env[1411]: time="2025-09-06T00:24:29.357807116Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 00:24:29.365895 env[1411]: time="2025-09-06T00:24:29.365859571Z" level=info msg="CreateContainer within sandbox \"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 00:24:29.404717 env[1411]: time="2025-09-06T00:24:29.404663517Z" level=info msg="CreateContainer within sandbox \"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"bb3a2af48689938c5ff77ee4b2d833ab29d0e5b708a17cb6212d4306d2550592\"" Sep 6 00:24:29.405492 env[1411]: time="2025-09-06T00:24:29.405299129Z" level=info msg="StartContainer for \"bb3a2af48689938c5ff77ee4b2d833ab29d0e5b708a17cb6212d4306d2550592\"" Sep 6 00:24:29.428743 kubelet[1873]: E0906 00:24:29.428617 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:29.432157 systemd[1]: Started cri-containerd-bb3a2af48689938c5ff77ee4b2d833ab29d0e5b708a17cb6212d4306d2550592.scope. Sep 6 00:24:29.453000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.453000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2b7c649d48 items=0 ppid=2797 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336132616634383638393933386335666637376565346232643833 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit: BPF prog-id=116 op=LOAD Sep 6 00:24:29.454000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b45f8 items=0 ppid=2797 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336132616634383638393933386335666637376565346232643833 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.454000 audit: BPF prog-id=117 op=LOAD Sep 6 00:24:29.454000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4648 items=0 ppid=2797 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336132616634383638393933386335666637376565346232643833 Sep 6 00:24:29.455000 audit: BPF prog-id=117 op=UNLOAD Sep 6 00:24:29.455000 audit: BPF prog-id=116 op=UNLOAD Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:29.455000 audit: BPF prog-id=118 op=LOAD Sep 6 00:24:29.455000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b46d8 items=0 ppid=2797 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:29.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336132616634383638393933386335666637376565346232643833 Sep 6 00:24:29.480977 env[1411]: time="2025-09-06T00:24:29.480920382Z" level=info msg="StartContainer for \"bb3a2af48689938c5ff77ee4b2d833ab29d0e5b708a17cb6212d4306d2550592\" returns successfully" Sep 6 00:24:29.519622 kubelet[1873]: I0906 00:24:29.519588 1873 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 00:24:29.519823 kubelet[1873]: I0906 00:24:29.519647 1873 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 00:24:29.644468 kubelet[1873]: I0906 00:24:29.644315 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-mnl7x" podStartSLOduration=14.799854503 podStartE2EDuration="19.644297121s" podCreationTimestamp="2025-09-06 00:24:10 +0000 UTC" firstStartedPulling="2025-09-06 00:24:23.004779741 +0000 UTC m=+29.574046881" lastFinishedPulling="2025-09-06 00:24:27.849222359 +0000 UTC m=+34.418489499" observedRunningTime="2025-09-06 00:24:28.668167594 +0000 UTC m=+35.237434834" watchObservedRunningTime="2025-09-06 00:24:29.644297121 +0000 UTC m=+36.213564361" Sep 6 00:24:30.429644 kubelet[1873]: E0906 00:24:30.429592 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:31.430205 kubelet[1873]: E0906 00:24:31.430147 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:32.430926 kubelet[1873]: E0906 00:24:32.430819 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:33.377908 kubelet[1873]: I0906 00:24:33.377836 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2vlwd" podStartSLOduration=31.869334631 podStartE2EDuration="39.377809147s" podCreationTimestamp="2025-09-06 00:23:54 +0000 UTC" firstStartedPulling="2025-09-06 00:24:21.850529023 +0000 UTC m=+28.419796263" lastFinishedPulling="2025-09-06 00:24:29.359003639 +0000 UTC m=+35.928270779" observedRunningTime="2025-09-06 00:24:29.646151457 +0000 UTC m=+36.215418697" watchObservedRunningTime="2025-09-06 00:24:33.377809147 +0000 UTC m=+39.947076387" Sep 6 00:24:33.378000 audit[3075]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.383848 kernel: kauditd_printk_skb: 90 callbacks suppressed Sep 6 00:24:33.383934 kernel: audit: type=1325 audit(1757118273.378:707): table=filter:76 family=2 entries=20 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.378000 audit[3075]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd67f71f30 a2=0 a3=7ffd67f71f1c items=0 ppid=2146 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.418677 kernel: audit: type=1300 audit(1757118273.378:707): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd67f71f30 a2=0 a3=7ffd67f71f1c items=0 ppid=2146 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:33.424356 systemd[1]: Created slice kubepods-besteffort-poda574d40d_9a13_4015_b86a_697d99a5d315.slice. Sep 6 00:24:33.430463 kernel: audit: type=1327 audit(1757118273.378:707): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:33.431994 kernel: audit: type=1325 audit(1757118273.423:708): table=nat:77 family=2 entries=26 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.423000 audit[3075]: NETFILTER_CFG table=nat:77 family=2 entries=26 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.432850 kubelet[1873]: E0906 00:24:33.432804 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:33.423000 audit[3075]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffd67f71f30 a2=0 a3=0 items=0 ppid=2146 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.464157 kernel: audit: type=1300 audit(1757118273.423:708): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffd67f71f30 a2=0 a3=0 items=0 ppid=2146 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.464257 kernel: audit: type=1327 audit(1757118273.423:708): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:33.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:33.483000 audit[3079]: NETFILTER_CFG table=filter:78 family=2 entries=32 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.483000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc58456980 a2=0 a3=7ffc5845696c items=0 ppid=2146 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.496052 kernel: audit: type=1325 audit(1757118273.483:709): table=filter:78 family=2 entries=32 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.496105 kernel: audit: type=1300 audit(1757118273.483:709): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc58456980 a2=0 a3=7ffc5845696c items=0 ppid=2146 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.497546 kubelet[1873]: I0906 00:24:33.497521 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a574d40d-9a13-4015-b86a-697d99a5d315-data\") pod \"nfs-server-provisioner-0\" (UID: \"a574d40d-9a13-4015-b86a-697d99a5d315\") " pod="default/nfs-server-provisioner-0" Sep 6 00:24:33.497768 kubelet[1873]: I0906 00:24:33.497753 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sbn2m\" (UniqueName: \"kubernetes.io/projected/a574d40d-9a13-4015-b86a-697d99a5d315-kube-api-access-sbn2m\") pod \"nfs-server-provisioner-0\" (UID: \"a574d40d-9a13-4015-b86a-697d99a5d315\") " pod="default/nfs-server-provisioner-0" Sep 6 00:24:33.519435 kernel: audit: type=1327 audit(1757118273.483:709): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:33.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:33.517000 audit[3079]: NETFILTER_CFG table=nat:79 family=2 entries=26 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.539706 kernel: audit: type=1325 audit(1757118273.517:710): table=nat:79 family=2 entries=26 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:33.517000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc58456980 a2=0 a3=0 items=0 ppid=2146 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:33.729775 env[1411]: time="2025-09-06T00:24:33.729319238Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a574d40d-9a13-4015-b86a-697d99a5d315,Namespace:default,Attempt:0,}" Sep 6 00:24:33.879913 systemd-networkd[1567]: cali60e51b789ff: Link UP Sep 6 00:24:33.892776 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:24:33.892877 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 6 00:24:33.896373 systemd-networkd[1567]: cali60e51b789ff: Gained carrier Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.811 [INFO][3081] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.21-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a574d40d-9a13-4015-b86a-697d99a5d315 1492 0 2025-09-06 00:24:33 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.21 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.811 [INFO][3081] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.839 [INFO][3094] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" HandleID="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Workload="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.840 [INFO][3094] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" HandleID="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Workload="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.21", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-06 00:24:33.839821552 +0000 UTC"}, Hostname:"10.200.8.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.840 [INFO][3094] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.840 [INFO][3094] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.840 [INFO][3094] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.21' Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.848 [INFO][3094] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.853 [INFO][3094] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.856 [INFO][3094] ipam/ipam.go 511: Trying affinity for 192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.858 [INFO][3094] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.860 [INFO][3094] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.860 [INFO][3094] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.64/26 handle="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.862 [INFO][3094] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380 Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.869 [INFO][3094] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.64/26 handle="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.874 [INFO][3094] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.67/26] block=192.168.122.64/26 handle="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.874 [INFO][3094] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.67/26] handle="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" host="10.200.8.21" Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.874 [INFO][3094] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:33.909384 env[1411]: 2025-09-06 00:24:33.874 [INFO][3094] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.67/26] IPv6=[] ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" HandleID="k8s-pod-network.a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Workload="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:33.911997 env[1411]: 2025-09-06 00:24:33.875 [INFO][3081] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a574d40d-9a13-4015-b86a-697d99a5d315", ResourceVersion:"1492", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.122.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:33.911997 env[1411]: 2025-09-06 00:24:33.876 [INFO][3081] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.67/32] ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:33.911997 env[1411]: 2025-09-06 00:24:33.876 [INFO][3081] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:33.911997 env[1411]: 2025-09-06 00:24:33.897 [INFO][3081] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:33.912273 env[1411]: 2025-09-06 00:24:33.897 [INFO][3081] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a574d40d-9a13-4015-b86a-697d99a5d315", ResourceVersion:"1492", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.122.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1e:91:21:05:ab:56", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:33.912273 env[1411]: 2025-09-06 00:24:33.907 [INFO][3081] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.21-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:24:33.924000 audit[3111]: NETFILTER_CFG table=filter:80 family=2 entries=46 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:24:33.924000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7fff545c8da0 a2=0 a3=7fff545c8d8c items=0 ppid=2582 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.924000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:24:33.929114 env[1411]: time="2025-09-06T00:24:33.928902196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:24:33.929114 env[1411]: time="2025-09-06T00:24:33.928944097Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:24:33.929114 env[1411]: time="2025-09-06T00:24:33.928958397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:24:33.934338 env[1411]: time="2025-09-06T00:24:33.929188301Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380 pid=3117 runtime=io.containerd.runc.v2 Sep 6 00:24:33.952138 systemd[1]: Started cri-containerd-a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380.scope. Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.965000 audit: BPF prog-id=119 op=LOAD Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3117 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626232333663316462323963346636386538666436636436356430 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3117 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626232333663316462323963346636386538666436636436356430 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit: BPF prog-id=120 op=LOAD Sep 6 00:24:33.966000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000244a0 items=0 ppid=3117 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626232333663316462323963346636386538666436636436356430 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit: BPF prog-id=121 op=LOAD Sep 6 00:24:33.966000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000244e8 items=0 ppid=3117 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626232333663316462323963346636386538666436636436356430 Sep 6 00:24:33.966000 audit: BPF prog-id=121 op=UNLOAD Sep 6 00:24:33.966000 audit: BPF prog-id=120 op=UNLOAD Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:33.966000 audit: BPF prog-id=122 op=LOAD Sep 6 00:24:33.966000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000248f8 items=0 ppid=3117 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:33.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137626232333663316462323963346636386538666436636436356430 Sep 6 00:24:34.001742 env[1411]: time="2025-09-06T00:24:34.001622156Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a574d40d-9a13-4015-b86a-697d99a5d315,Namespace:default,Attempt:0,} returns sandbox id \"a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380\"" Sep 6 00:24:34.006437 env[1411]: time="2025-09-06T00:24:34.006401536Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 6 00:24:34.397189 kubelet[1873]: E0906 00:24:34.397140 1873 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:34.433977 kubelet[1873]: E0906 00:24:34.433917 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:34.610181 systemd[1]: run-containerd-runc-k8s.io-a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380-runc.Q646r5.mount: Deactivated successfully. Sep 6 00:24:35.004232 systemd-networkd[1567]: cali60e51b789ff: Gained IPv6LL Sep 6 00:24:35.434983 kubelet[1873]: E0906 00:24:35.434914 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:36.436007 kubelet[1873]: E0906 00:24:36.435944 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:36.778683 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3584767338.mount: Deactivated successfully. Sep 6 00:24:37.436269 kubelet[1873]: E0906 00:24:37.436196 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:38.437347 kubelet[1873]: E0906 00:24:38.437287 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:39.191398 env[1411]: time="2025-09-06T00:24:39.191340253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:39.201359 env[1411]: time="2025-09-06T00:24:39.201303602Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:39.207028 env[1411]: time="2025-09-06T00:24:39.206975386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:39.214073 env[1411]: time="2025-09-06T00:24:39.214032091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:24:39.214798 env[1411]: time="2025-09-06T00:24:39.214760302Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 6 00:24:39.223050 env[1411]: time="2025-09-06T00:24:39.223009225Z" level=info msg="CreateContainer within sandbox \"a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 6 00:24:39.267195 env[1411]: time="2025-09-06T00:24:39.267126483Z" level=info msg="CreateContainer within sandbox \"a7bb236c1db29c4f68e8fd6cd65d015a4d370732687a5951c123d9736dd1b380\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"10fb75bb2cd59218f7d2c15d720a15b37d8b1bd9b39df2f43a841cd640b01484\"" Sep 6 00:24:39.267960 env[1411]: time="2025-09-06T00:24:39.267906195Z" level=info msg="StartContainer for \"10fb75bb2cd59218f7d2c15d720a15b37d8b1bd9b39df2f43a841cd640b01484\"" Sep 6 00:24:39.296324 systemd[1]: Started cri-containerd-10fb75bb2cd59218f7d2c15d720a15b37d8b1bd9b39df2f43a841cd640b01484.scope. Sep 6 00:24:39.314079 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 6 00:24:39.314201 kernel: audit: type=1400 audit(1757118279.307:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.345435 kernel: audit: type=1400 audit(1757118279.307:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.361480 kernel: audit: type=1400 audit(1757118279.307:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.378126 kernel: audit: type=1400 audit(1757118279.307:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.378259 kernel: audit: type=1400 audit(1757118279.307:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.427678 kernel: audit: type=1400 audit(1757118279.307:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.427790 kernel: audit: type=1400 audit(1757118279.307:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.437719 kubelet[1873]: E0906 00:24:39.437674 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:39.444372 kernel: audit: type=1400 audit(1757118279.307:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.462683 env[1411]: time="2025-09-06T00:24:39.462640798Z" level=info msg="StartContainer for \"10fb75bb2cd59218f7d2c15d720a15b37d8b1bd9b39df2f43a841cd640b01484\" returns successfully" Sep 6 00:24:39.474637 kernel: audit: type=1400 audit(1757118279.307:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.474750 kernel: audit: type=1400 audit(1757118279.312:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.312000 audit: BPF prog-id=123 op=LOAD Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3117 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:39.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666237356262326364353932313866376432633135643732306131 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3117 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:39.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666237356262326364353932313866376432633135643732306131 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.318000 audit: BPF prog-id=124 op=LOAD Sep 6 00:24:39.318000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ac040 items=0 ppid=3117 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:39.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666237356262326364353932313866376432633135643732306131 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.344000 audit: BPF prog-id=125 op=LOAD Sep 6 00:24:39.344000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ac088 items=0 ppid=3117 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:39.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666237356262326364353932313866376432633135643732306131 Sep 6 00:24:39.393000 audit: BPF prog-id=125 op=UNLOAD Sep 6 00:24:39.393000 audit: BPF prog-id=124 op=UNLOAD Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:24:39.393000 audit: BPF prog-id=126 op=LOAD Sep 6 00:24:39.393000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ac498 items=0 ppid=3117 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:39.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666237356262326364353932313866376432633135643732306131 Sep 6 00:24:39.495000 audit[3188]: AVC avc: denied { search } for pid=3188 comm="rpcbind" name="crypto" dev="proc" ino=26760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:24:39.495000 audit[3188]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fcd56e6e0c0 a2=0 a3=0 items=0 ppid=3172 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 key=(null) Sep 6 00:24:39.495000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 6 00:24:39.531000 audit[3193]: AVC avc: denied { search } for pid=3193 comm="dbus-daemon" name="crypto" dev="proc" ino=26760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:24:39.531000 audit[3193]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbefa6a10c0 a2=0 a3=0 items=0 ppid=3172 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 key=(null) Sep 6 00:24:39.531000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:24:39.534000 audit[3194]: AVC avc: denied { watch } for pid=3194 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537454 scontext=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c266,c605 tclass=dir permissive=0 Sep 6 00:24:39.534000 audit[3194]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5639cd50d530 a2=2c8 a3=7fffd29e8c2c items=0 ppid=3172 pid=3194 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 key=(null) Sep 6 00:24:39.534000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:24:39.540000 audit[3195]: AVC avc: denied { read } for pid=3195 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 6 00:24:39.540000 audit[3195]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f45e86a8320 a1=80000 a2=d a3=7ffeaedba410 items=0 ppid=3172 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 key=(null) Sep 6 00:24:39.540000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:24:39.541000 audit[3195]: AVC avc: denied { search } for pid=3195 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26760 scontext=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:24:39.541000 audit[3195]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f45e7bfc0c0 a2=0 a3=0 items=0 ppid=3172 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c266,c605 key=(null) Sep 6 00:24:39.541000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:24:39.666466 kubelet[1873]: I0906 00:24:39.666406 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.455995239 podStartE2EDuration="6.666384936s" podCreationTimestamp="2025-09-06 00:24:33 +0000 UTC" firstStartedPulling="2025-09-06 00:24:34.005768626 +0000 UTC m=+40.575035766" lastFinishedPulling="2025-09-06 00:24:39.216158323 +0000 UTC m=+45.785425463" observedRunningTime="2025-09-06 00:24:39.666287635 +0000 UTC m=+46.235554775" watchObservedRunningTime="2025-09-06 00:24:39.666384936 +0000 UTC m=+46.235652076" Sep 6 00:24:39.681000 audit[3200]: NETFILTER_CFG table=filter:81 family=2 entries=20 op=nft_register_rule pid=3200 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:39.681000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd79edc8a0 a2=0 a3=7ffd79edc88c items=0 ppid=2146 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:39.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:39.686000 audit[3200]: NETFILTER_CFG table=nat:82 family=2 entries=110 op=nft_register_chain pid=3200 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:24:39.686000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffd79edc8a0 a2=0 a3=7ffd79edc88c items=0 ppid=2146 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:24:39.686000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:24:40.438289 kubelet[1873]: E0906 00:24:40.438227 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:41.439346 kubelet[1873]: E0906 00:24:41.439285 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:42.439491 kubelet[1873]: E0906 00:24:42.439437 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:43.439763 kubelet[1873]: E0906 00:24:43.439702 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:44.440703 kubelet[1873]: E0906 00:24:44.440639 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:45.441094 kubelet[1873]: E0906 00:24:45.441036 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:46.442056 kubelet[1873]: E0906 00:24:46.441997 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:47.443032 kubelet[1873]: E0906 00:24:47.442974 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:48.443630 kubelet[1873]: E0906 00:24:48.443570 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:48.593648 systemd[1]: run-containerd-runc-k8s.io-98db9563a3a2d637be75e8ff38efae2294ddd1039ed5458ebb423bbebcfbdaab-runc.B1pHXB.mount: Deactivated successfully. Sep 6 00:24:49.444752 kubelet[1873]: E0906 00:24:49.444688 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:50.445776 kubelet[1873]: E0906 00:24:50.445708 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:51.446839 kubelet[1873]: E0906 00:24:51.446780 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:52.447753 kubelet[1873]: E0906 00:24:52.447698 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:53.448011 kubelet[1873]: E0906 00:24:53.447951 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:54.397086 kubelet[1873]: E0906 00:24:54.397033 1873 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:54.448475 kubelet[1873]: E0906 00:24:54.448435 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:54.466698 env[1411]: time="2025-09-06T00:24:54.466654572Z" level=info msg="StopPodSandbox for \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\"" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.508 [WARNING][3257] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b", ResourceVersion:"1453", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313", Pod:"nginx-deployment-7fcdb87857-mnl7x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3fd99e1b667", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.508 [INFO][3257] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.508 [INFO][3257] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" iface="eth0" netns="" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.508 [INFO][3257] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.508 [INFO][3257] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.537 [INFO][3264] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.537 [INFO][3264] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.537 [INFO][3264] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.545 [WARNING][3264] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.545 [INFO][3264] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.549 [INFO][3264] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:54.551888 env[1411]: 2025-09-06 00:24:54.550 [INFO][3257] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.551888 env[1411]: time="2025-09-06T00:24:54.551864571Z" level=info msg="TearDown network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\" successfully" Sep 6 00:24:54.552665 env[1411]: time="2025-09-06T00:24:54.551907271Z" level=info msg="StopPodSandbox for \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\" returns successfully" Sep 6 00:24:54.552665 env[1411]: time="2025-09-06T00:24:54.552600279Z" level=info msg="RemovePodSandbox for \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\"" Sep 6 00:24:54.552762 env[1411]: time="2025-09-06T00:24:54.552641979Z" level=info msg="Forcibly stopping sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\"" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.594 [WARNING][3280] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d9aaadf6-1c33-423a-80bf-d8d3aeeb0c2b", ResourceVersion:"1453", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"002935836730ccaf0df3069921dfe8a63e2ea44a6050a0f42102b9fefb9b9313", Pod:"nginx-deployment-7fcdb87857-mnl7x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3fd99e1b667", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.594 [INFO][3280] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.594 [INFO][3280] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" iface="eth0" netns="" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.594 [INFO][3280] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.594 [INFO][3280] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.618 [INFO][3287] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.619 [INFO][3287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.619 [INFO][3287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.625 [WARNING][3287] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.626 [INFO][3287] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" HandleID="k8s-pod-network.3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Workload="10.200.8.21-k8s-nginx--deployment--7fcdb87857--mnl7x-eth0" Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.627 [INFO][3287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:54.629525 env[1411]: 2025-09-06 00:24:54.628 [INFO][3280] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6" Sep 6 00:24:54.630298 env[1411]: time="2025-09-06T00:24:54.629573290Z" level=info msg="TearDown network for sandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\" successfully" Sep 6 00:24:54.641524 env[1411]: time="2025-09-06T00:24:54.641470316Z" level=info msg="RemovePodSandbox \"3ae6ae7f6687a2c8f05f9823b729341d88046ad4ee10f3630de4bd450bebcaa6\" returns successfully" Sep 6 00:24:54.642153 env[1411]: time="2025-09-06T00:24:54.642119023Z" level=info msg="StopPodSandbox for \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\"" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.703 [WARNING][3302] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-csi--node--driver--2vlwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ace0bd0b-5c74-4ef2-875b-36412762cdca", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71", Pod:"csi-node-driver-2vlwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali378c1612ea2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.704 [INFO][3302] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.704 [INFO][3302] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" iface="eth0" netns="" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.704 [INFO][3302] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.704 [INFO][3302] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.727 [INFO][3309] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.727 [INFO][3309] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.728 [INFO][3309] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.735 [WARNING][3309] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.735 [INFO][3309] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.737 [INFO][3309] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:54.739370 env[1411]: 2025-09-06 00:24:54.738 [INFO][3302] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.740802 env[1411]: time="2025-09-06T00:24:54.739333248Z" level=info msg="TearDown network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\" successfully" Sep 6 00:24:54.740923 env[1411]: time="2025-09-06T00:24:54.740807964Z" level=info msg="StopPodSandbox for \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\" returns successfully" Sep 6 00:24:54.741518 env[1411]: time="2025-09-06T00:24:54.741487971Z" level=info msg="RemovePodSandbox for \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\"" Sep 6 00:24:54.741626 env[1411]: time="2025-09-06T00:24:54.741526871Z" level=info msg="Forcibly stopping sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\"" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.777 [WARNING][3324] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-csi--node--driver--2vlwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ace0bd0b-5c74-4ef2-875b-36412762cdca", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"22256a069a7e7565d3af84eb535a234c0380f1912f49b79b26d47da82de75b71", Pod:"csi-node-driver-2vlwd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.122.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali378c1612ea2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.777 [INFO][3324] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.778 [INFO][3324] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" iface="eth0" netns="" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.778 [INFO][3324] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.778 [INFO][3324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.800 [INFO][3331] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.800 [INFO][3331] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.800 [INFO][3331] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.807 [WARNING][3331] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.807 [INFO][3331] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" HandleID="k8s-pod-network.d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Workload="10.200.8.21-k8s-csi--node--driver--2vlwd-eth0" Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.808 [INFO][3331] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:24:54.810673 env[1411]: 2025-09-06 00:24:54.809 [INFO][3324] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51" Sep 6 00:24:54.811385 env[1411]: time="2025-09-06T00:24:54.811341107Z" level=info msg="TearDown network for sandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\" successfully" Sep 6 00:24:54.820483 env[1411]: time="2025-09-06T00:24:54.820444703Z" level=info msg="RemovePodSandbox \"d3f46ae1882ee58a3c7fa44d2177ea4699c0770334612b07764308cd06cbef51\" returns successfully" Sep 6 00:24:55.449434 kubelet[1873]: E0906 00:24:55.449369 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:56.450465 kubelet[1873]: E0906 00:24:56.450399 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:57.451352 kubelet[1873]: E0906 00:24:57.451296 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:58.452358 kubelet[1873]: E0906 00:24:58.452297 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:59.453485 kubelet[1873]: E0906 00:24:59.453410 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:24:59.739870 systemd[1]: Created slice kubepods-besteffort-pod47016ccd_9b1f_434a_bc3d_237fdffeb28e.slice. Sep 6 00:24:59.840158 kubelet[1873]: I0906 00:24:59.840108 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f5aa4aa7-3c42-46f5-a7f0-18e1336f64d8\" (UniqueName: \"kubernetes.io/nfs/47016ccd-9b1f-434a-bc3d-237fdffeb28e-pvc-f5aa4aa7-3c42-46f5-a7f0-18e1336f64d8\") pod \"test-pod-1\" (UID: \"47016ccd-9b1f-434a-bc3d-237fdffeb28e\") " pod="default/test-pod-1" Sep 6 00:24:59.840158 kubelet[1873]: I0906 00:24:59.840159 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-knp2n\" (UniqueName: \"kubernetes.io/projected/47016ccd-9b1f-434a-bc3d-237fdffeb28e-kube-api-access-knp2n\") pod \"test-pod-1\" (UID: \"47016ccd-9b1f-434a-bc3d-237fdffeb28e\") " pod="default/test-pod-1" Sep 6 00:25:00.011164 kernel: Failed to create system directory netfs Sep 6 00:25:00.011445 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 00:25:00.011481 kernel: audit: type=1400 audit(1757118300.004:755): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.004000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.056649 kernel: Failed to create system directory netfs Sep 6 00:25:00.056808 kernel: audit: type=1400 audit(1757118300.004:755): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.056844 kernel: Failed to create system directory netfs Sep 6 00:25:00.004000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.079436 kernel: audit: type=1400 audit(1757118300.004:755): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.079585 kernel: Failed to create system directory netfs Sep 6 00:25:00.004000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.118474 kernel: audit: type=1400 audit(1757118300.004:755): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.004000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.004000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fcd44bd5e0 a1=153bc a2=55fcb0a842b0 a3=5 items=0 ppid=472 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:00.004000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:00.148364 kernel: audit: type=1300 audit(1757118300.004:755): arch=c000003e syscall=175 success=yes exit=0 a0=55fcd44bd5e0 a1=153bc a2=55fcb0a842b0 a3=5 items=0 ppid=472 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:00.148502 kernel: audit: type=1327 audit(1757118300.004:755): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:00.175247 kernel: Failed to create system directory fscache Sep 6 00:25:00.175399 kernel: audit: type=1400 audit(1757118300.145:756): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.175430 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.197107 kernel: audit: type=1400 audit(1757118300.145:756): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.197258 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.218236 kernel: audit: type=1400 audit(1757118300.145:756): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.218372 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.239389 kernel: audit: type=1400 audit(1757118300.145:756): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.239532 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.246985 kernel: Failed to create system directory fscache Sep 6 00:25:00.247107 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.254691 kernel: Failed to create system directory fscache Sep 6 00:25:00.254796 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.262180 kernel: Failed to create system directory fscache Sep 6 00:25:00.262256 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.269390 kernel: Failed to create system directory fscache Sep 6 00:25:00.269453 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.145000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.276726 kernel: Failed to create system directory fscache Sep 6 00:25:00.145000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fcd46d29c0 a1=4c0fc a2=55fcb0a842b0 a3=5 items=0 ppid=472 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:00.145000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:00.280991 kernel: FS-Cache: Loaded Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.381377 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.381483 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.381513 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.388739 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.388823 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.395776 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.395853 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.399320 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.406525 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.406600 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.422014 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.422165 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.426142 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.435606 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.435671 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.435696 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.442330 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.442394 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.448496 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.448555 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.453871 kubelet[1873]: E0906 00:25:00.453825 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:00.454997 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.455062 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.461316 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.461382 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.467364 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.470764 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.470832 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.476662 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.476729 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.480631 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.483071 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.488974 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.489033 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.495505 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.495563 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.501321 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.501388 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.507099 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.507151 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.516188 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.516262 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.523851 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.523912 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.523937 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.529405 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.529471 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.535023 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.535090 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.545379 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.545489 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.551268 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.551346 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.557348 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.557409 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.563184 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.563243 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.568807 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.568870 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.574744 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.574808 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.580596 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.580662 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.589859 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.589920 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.589944 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.595572 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.595634 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.601191 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.601299 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.607140 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.607216 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.612697 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.612762 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.618417 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.621453 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.624292 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.627124 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.627193 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.632706 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.632752 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.638737 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.639572 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.642050 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.647897 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.647947 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.653784 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.653833 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.659581 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.659631 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.665161 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.665209 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.674124 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.674174 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.679832 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.685859 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.685927 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.685952 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.691703 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.692531 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.694980 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.700671 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.700721 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.703609 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.709296 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.709353 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.715050 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.715096 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.720860 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.720920 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.726682 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.726746 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.732955 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.736858 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.736912 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.739798 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.742621 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.745551 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.750545 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.750605 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.756478 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.756519 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.762239 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.762287 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.768076 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.768130 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.770946 kernel: Failed to create system directory sunrpc Sep 6 00:25:00.359000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.792770 kernel: RPC: Registered named UNIX socket transport module. Sep 6 00:25:00.792883 kernel: RPC: Registered udp transport module. Sep 6 00:25:00.792906 kernel: RPC: Registered tcp transport module. Sep 6 00:25:00.799111 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 6 00:25:00.359000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fcd471ead0 a1=1a81bc a2=55fcb0a842b0 a3=5 items=6 ppid=472 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:00.359000 audit: CWD cwd="/" Sep 6 00:25:00.359000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:00.359000 audit: PATH item=1 name=(null) inode=26459 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:00.359000 audit: PATH item=2 name=(null) inode=26459 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:00.359000 audit: PATH item=3 name=(null) inode=26460 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:00.359000 audit: PATH item=4 name=(null) inode=26459 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:00.359000 audit: PATH item=5 name=(null) inode=26461 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:25:00.359000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.898112 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.904570 kernel: Failed to create system directory nfs Sep 6 00:25:00.904647 kernel: Failed to create system directory nfs Sep 6 00:25:00.904669 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.910364 kernel: Failed to create system directory nfs Sep 6 00:25:00.910438 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.916340 kernel: Failed to create system directory nfs Sep 6 00:25:00.916408 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.925169 kernel: Failed to create system directory nfs Sep 6 00:25:00.925213 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.931223 kernel: Failed to create system directory nfs Sep 6 00:25:00.931289 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.937133 kernel: Failed to create system directory nfs Sep 6 00:25:00.937189 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.943206 kernel: Failed to create system directory nfs Sep 6 00:25:00.943272 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.948824 kernel: Failed to create system directory nfs Sep 6 00:25:00.948885 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.954798 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.957816 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.958014 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.963737 kernel: Failed to create system directory nfs Sep 6 00:25:00.963790 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.966796 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.969771 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.972605 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.978414 kernel: Failed to create system directory nfs Sep 6 00:25:00.978455 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.984224 kernel: Failed to create system directory nfs Sep 6 00:25:00.984274 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.990019 kernel: Failed to create system directory nfs Sep 6 00:25:00.990085 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.995602 kernel: Failed to create system directory nfs Sep 6 00:25:00.995654 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.001583 kernel: Failed to create system directory nfs Sep 6 00:25:01.001645 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.007312 kernel: Failed to create system directory nfs Sep 6 00:25:01.007378 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.013000 kernel: Failed to create system directory nfs Sep 6 00:25:01.013053 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.019065 kernel: Failed to create system directory nfs Sep 6 00:25:01.019117 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.024809 kernel: Failed to create system directory nfs Sep 6 00:25:01.024888 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.030684 kernel: Failed to create system directory nfs Sep 6 00:25:01.030735 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.036644 kernel: Failed to create system directory nfs Sep 6 00:25:01.036693 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.043084 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.046250 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.049052 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.051897 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.054786 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.058152 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.061014 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.066558 kernel: Failed to create system directory nfs Sep 6 00:25:01.066606 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.069386 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.072305 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:00.883000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.077902 kernel: Failed to create system directory nfs Sep 6 00:25:00.883000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fcd493faf0 a1=16f02c a2=55fcb0a842b0 a3=5 items=0 ppid=472 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:00.883000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:25:01.099041 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.196104 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.196214 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.202039 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.202116 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.205984 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.208045 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.214148 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.214207 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.220255 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.220326 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.226119 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.226187 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.231935 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.232005 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.238018 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.238087 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.244226 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.248117 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.248257 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.254328 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.254453 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.260626 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.260723 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.266730 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.266796 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.272902 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.273013 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.278869 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.278954 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.288313 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.288372 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.291449 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.294368 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.298036 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.303468 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.306550 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.309689 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.309745 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.315834 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.315886 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.321739 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.321790 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.327344 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.327402 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.333543 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.333592 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.339982 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.340038 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.345911 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.345986 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.351772 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.357951 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.358026 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.358056 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.363943 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.364014 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.370109 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.370151 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.373219 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.376223 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.379612 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.383112 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.389060 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.389124 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.394994 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.395042 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.401054 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.401116 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.405026 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.418326 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.418415 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.424083 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.424149 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.429833 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.429881 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.435398 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.435438 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.441069 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.441130 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.446514 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.446568 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.452047 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.452098 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.454385 kubelet[1873]: E0906 00:25:01.454324 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.457752 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.457816 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.461270 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.466364 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.466413 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.470018 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.474741 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.474781 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.480628 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.480680 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.176000 audit[3351]: AVC avc: denied { confidentiality } for pid=3351 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.486263 kernel: Failed to create system directory nfs4 Sep 6 00:25:01.604839 kernel: NFS: Registering the id_resolver key type Sep 6 00:25:01.605034 kernel: Key type id_resolver registered Sep 6 00:25:01.605065 kernel: Key type id_legacy registered Sep 6 00:25:01.176000 audit[3351]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4f3619a010 a1=20955c a2=56116a84f2b0 a3=5 items=0 ppid=472 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:01.176000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.645314 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.645395 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.645533 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.651775 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.652499 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.661070 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.661134 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.661158 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.668038 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.674383 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.674450 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.680772 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.680837 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.687088 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.687160 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.693267 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.693455 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.699603 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.699660 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.706874 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.706960 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.712826 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.712902 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.716053 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.719184 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.722140 kernel: Failed to create system directory rpcgss Sep 6 00:25:01.635000 audit[3352]: AVC avc: denied { confidentiality } for pid=3352 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:25:01.635000 audit[3352]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe292cdc010 a1=70bac a2=55aded0352b0 a3=5 items=0 ppid=472 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:01.635000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 6 00:25:02.067676 nfsidmap[3360]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-0e63f2a0ae' Sep 6 00:25:02.108610 nfsidmap[3361]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-0e63f2a0ae' Sep 6 00:25:02.117000 audit[1523]: AVC avc: denied { watch_reads } for pid=1523 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:02.117000 audit[1523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562a1ca318d0 a2=10 a3=93ea114351fba712 items=0 ppid=1 pid=1523 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.117000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:25:02.117000 audit[1523]: AVC avc: denied { watch_reads } for pid=1523 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:02.117000 audit[1523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562a1ca318d0 a2=10 a3=93ea114351fba712 items=0 ppid=1 pid=1523 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.117000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:25:02.117000 audit[1523]: AVC avc: denied { watch_reads } for pid=1523 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:02.117000 audit[1523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562a1ca318d0 a2=10 a3=93ea114351fba712 items=0 ppid=1 pid=1523 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.117000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:25:02.118000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:02.119000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:02.119000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:25:02.143651 env[1411]: time="2025-09-06T00:25:02.143592431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:47016ccd-9b1f-434a-bc3d-237fdffeb28e,Namespace:default,Attempt:0,}" Sep 6 00:25:02.285572 systemd-networkd[1567]: cali5ec59c6bf6e: Link UP Sep 6 00:25:02.290050 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:25:02.290135 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 6 00:25:02.296306 systemd-networkd[1567]: cali5ec59c6bf6e: Gained carrier Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.219 [INFO][3362] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.21-k8s-test--pod--1-eth0 default 47016ccd-9b1f-434a-bc3d-237fdffeb28e 1586 0 2025-09-06 00:24:34 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.21 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.219 [INFO][3362] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-eth0" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.245 [INFO][3375] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" HandleID="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Workload="10.200.8.21-k8s-test--pod--1-eth0" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.245 [INFO][3375] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" HandleID="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Workload="10.200.8.21-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.21", "pod":"test-pod-1", "timestamp":"2025-09-06 00:25:02.244994037 +0000 UTC"}, Hostname:"10.200.8.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.245 [INFO][3375] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.245 [INFO][3375] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.245 [INFO][3375] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.21' Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.254 [INFO][3375] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.258 [INFO][3375] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.262 [INFO][3375] ipam/ipam.go 511: Trying affinity for 192.168.122.64/26 host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.263 [INFO][3375] ipam/ipam.go 158: Attempting to load block cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.265 [INFO][3375] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.122.64/26 host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.265 [INFO][3375] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.122.64/26 handle="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.266 [INFO][3375] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1 Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.274 [INFO][3375] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.122.64/26 handle="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.279 [INFO][3375] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.122.68/26] block=192.168.122.64/26 handle="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.279 [INFO][3375] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.122.68/26] handle="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" host="10.200.8.21" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.280 [INFO][3375] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.280 [INFO][3375] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.122.68/26] IPv6=[] ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" HandleID="k8s-pod-network.d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Workload="10.200.8.21-k8s-test--pod--1-eth0" Sep 6 00:25:02.311156 env[1411]: 2025-09-06 00:25:02.281 [INFO][3362] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"47016ccd-9b1f-434a-bc3d-237fdffeb28e", ResourceVersion:"1586", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:25:02.312366 env[1411]: 2025-09-06 00:25:02.281 [INFO][3362] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.122.68/32] ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-eth0" Sep 6 00:25:02.312366 env[1411]: 2025-09-06 00:25:02.281 [INFO][3362] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-eth0" Sep 6 00:25:02.312366 env[1411]: 2025-09-06 00:25:02.298 [INFO][3362] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-eth0" Sep 6 00:25:02.312366 env[1411]: 2025-09-06 00:25:02.299 [INFO][3362] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"47016ccd-9b1f-434a-bc3d-237fdffeb28e", ResourceVersion:"1586", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 24, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.21", ContainerID:"d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.122.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"92:82:91:5e:64:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:25:02.312366 env[1411]: 2025-09-06 00:25:02.308 [INFO][3362] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.21-k8s-test--pod--1-eth0" Sep 6 00:25:02.324000 audit[3390]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:25:02.324000 audit[3390]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffd7b5d38a0 a2=0 a3=7ffd7b5d388c items=0 ppid=2582 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:25:02.330190 env[1411]: time="2025-09-06T00:25:02.330101598Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:25:02.330348 env[1411]: time="2025-09-06T00:25:02.330162199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:25:02.330348 env[1411]: time="2025-09-06T00:25:02.330177699Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:25:02.330576 env[1411]: time="2025-09-06T00:25:02.330517802Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1 pid=3398 runtime=io.containerd.runc.v2 Sep 6 00:25:02.352458 systemd[1]: Started cri-containerd-d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1.scope. Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.364000 audit: BPF prog-id=127 op=LOAD Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3398 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306463616334623333346666626132626138373930613239356462 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3398 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306463616334623333346666626132626138373930613239356462 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit: BPF prog-id=128 op=LOAD Sep 6 00:25:02.365000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001feb40 items=0 ppid=3398 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306463616334623333346666626132626138373930613239356462 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit: BPF prog-id=129 op=LOAD Sep 6 00:25:02.365000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001feb88 items=0 ppid=3398 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306463616334623333346666626132626138373930613239356462 Sep 6 00:25:02.365000 audit: BPF prog-id=129 op=UNLOAD Sep 6 00:25:02.365000 audit: BPF prog-id=128 op=UNLOAD Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.365000 audit: BPF prog-id=130 op=LOAD Sep 6 00:25:02.365000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001fef98 items=0 ppid=3398 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437306463616334623333346666626132626138373930613239356462 Sep 6 00:25:02.404208 env[1411]: time="2025-09-06T00:25:02.404145160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:47016ccd-9b1f-434a-bc3d-237fdffeb28e,Namespace:default,Attempt:0,} returns sandbox id \"d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1\"" Sep 6 00:25:02.406135 env[1411]: time="2025-09-06T00:25:02.406094778Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:25:02.455351 kubelet[1873]: E0906 00:25:02.455271 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:02.824036 env[1411]: time="2025-09-06T00:25:02.823954914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:02.831477 env[1411]: time="2025-09-06T00:25:02.831430281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:02.836396 env[1411]: time="2025-09-06T00:25:02.836355725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:02.840802 env[1411]: time="2025-09-06T00:25:02.840763765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:25:02.841465 env[1411]: time="2025-09-06T00:25:02.841429571Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:25:02.852544 env[1411]: time="2025-09-06T00:25:02.852501970Z" level=info msg="CreateContainer within sandbox \"d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 6 00:25:02.883665 env[1411]: time="2025-09-06T00:25:02.883605948Z" level=info msg="CreateContainer within sandbox \"d70dcac4b334ffba2ba8790a295dbeb73428f26c18fd532b0a9c011749c6c0d1\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9360c5c0029e03c95e391c0262fcfa236f01deb13b22c0a9fd2a9c4fbf788e76\"" Sep 6 00:25:02.884410 env[1411]: time="2025-09-06T00:25:02.884287054Z" level=info msg="StartContainer for \"9360c5c0029e03c95e391c0262fcfa236f01deb13b22c0a9fd2a9c4fbf788e76\"" Sep 6 00:25:02.901707 systemd[1]: Started cri-containerd-9360c5c0029e03c95e391c0262fcfa236f01deb13b22c0a9fd2a9c4fbf788e76.scope. Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.917000 audit: BPF prog-id=131 op=LOAD Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3398 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933363063356330303239653033633935653339316330323632666366 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3398 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933363063356330303239653033633935653339316330323632666366 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit: BPF prog-id=132 op=LOAD Sep 6 00:25:02.918000 audit[3441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00037f1d0 items=0 ppid=3398 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933363063356330303239653033633935653339316330323632666366 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit: BPF prog-id=133 op=LOAD Sep 6 00:25:02.918000 audit[3441]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00037f218 items=0 ppid=3398 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933363063356330303239653033633935653339316330323632666366 Sep 6 00:25:02.918000 audit: BPF prog-id=133 op=UNLOAD Sep 6 00:25:02.918000 audit: BPF prog-id=132 op=UNLOAD Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { perfmon } for pid=3441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit[3441]: AVC avc: denied { bpf } for pid=3441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:25:02.918000 audit: BPF prog-id=134 op=LOAD Sep 6 00:25:02.918000 audit[3441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00037f628 items=0 ppid=3398 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:25:02.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933363063356330303239653033633935653339316330323632666366 Sep 6 00:25:02.939184 env[1411]: time="2025-09-06T00:25:02.939127744Z" level=info msg="StartContainer for \"9360c5c0029e03c95e391c0262fcfa236f01deb13b22c0a9fd2a9c4fbf788e76\" returns successfully" Sep 6 00:25:03.455808 kubelet[1873]: E0906 00:25:03.455748 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:03.728723 kubelet[1873]: I0906 00:25:03.728536 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=29.289482351 podStartE2EDuration="29.728519877s" podCreationTimestamp="2025-09-06 00:24:34 +0000 UTC" firstStartedPulling="2025-09-06 00:25:02.40521757 +0000 UTC m=+68.974484710" lastFinishedPulling="2025-09-06 00:25:02.844255096 +0000 UTC m=+69.413522236" observedRunningTime="2025-09-06 00:25:03.728210875 +0000 UTC m=+70.297478115" watchObservedRunningTime="2025-09-06 00:25:03.728519877 +0000 UTC m=+70.297787017" Sep 6 00:25:03.932261 systemd-networkd[1567]: cali5ec59c6bf6e: Gained IPv6LL Sep 6 00:25:04.456232 kubelet[1873]: E0906 00:25:04.456170 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:05.457393 kubelet[1873]: E0906 00:25:05.457334 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:06.457859 kubelet[1873]: E0906 00:25:06.457797 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:07.458982 kubelet[1873]: E0906 00:25:07.458913 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:08.459341 kubelet[1873]: E0906 00:25:08.459289 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:09.460393 kubelet[1873]: E0906 00:25:09.460334 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:10.460727 kubelet[1873]: E0906 00:25:10.460671 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:11.461537 kubelet[1873]: E0906 00:25:11.461476 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:12.461890 kubelet[1873]: E0906 00:25:12.461826 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:25:13.462056 kubelet[1873]: E0906 00:25:13.461997 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"