Sep 6 01:24:38.866647 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 01:24:38.866672 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:24:38.866685 kernel: BIOS-provided physical RAM map: Sep 6 01:24:38.866692 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Sep 6 01:24:38.866699 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Sep 6 01:24:38.866706 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Sep 6 01:24:38.866714 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Sep 6 01:24:38.866722 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Sep 6 01:24:38.866729 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Sep 6 01:24:38.866735 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Sep 6 01:24:38.866756 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Sep 6 01:24:38.866763 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Sep 6 01:24:38.866770 kernel: NX (Execute Disable) protection: active Sep 6 01:24:38.866777 kernel: SMBIOS 2.8 present. Sep 6 01:24:38.866787 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Sep 6 01:24:38.866795 kernel: Hypervisor detected: KVM Sep 6 01:24:38.866805 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 6 01:24:38.866812 kernel: kvm-clock: cpu 0, msr 6419f001, primary cpu clock Sep 6 01:24:38.866820 kernel: kvm-clock: using sched offset of 4166763169 cycles Sep 6 01:24:38.866828 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 6 01:24:38.866837 kernel: tsc: Detected 2294.608 MHz processor Sep 6 01:24:38.866845 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 01:24:38.866853 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 01:24:38.866861 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Sep 6 01:24:38.866869 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 01:24:38.866879 kernel: Using GB pages for direct mapping Sep 6 01:24:38.866887 kernel: ACPI: Early table checksum verification disabled Sep 6 01:24:38.866894 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Sep 6 01:24:38.866902 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:24:38.866910 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:24:38.866918 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:24:38.866926 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Sep 6 01:24:38.866934 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:24:38.866941 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:24:38.866952 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:24:38.866959 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:24:38.866967 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Sep 6 01:24:38.866975 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Sep 6 01:24:38.866983 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Sep 6 01:24:38.866991 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Sep 6 01:24:38.867003 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Sep 6 01:24:38.867013 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Sep 6 01:24:38.867022 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Sep 6 01:24:38.867030 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 01:24:38.867039 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 01:24:38.867047 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Sep 6 01:24:38.867055 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Sep 6 01:24:38.867064 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Sep 6 01:24:38.867074 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Sep 6 01:24:38.867082 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Sep 6 01:24:38.867091 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Sep 6 01:24:38.867099 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Sep 6 01:24:38.867107 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Sep 6 01:24:38.867123 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Sep 6 01:24:38.867132 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Sep 6 01:24:38.867140 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Sep 6 01:24:38.867148 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Sep 6 01:24:38.867157 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Sep 6 01:24:38.867168 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Sep 6 01:24:38.867176 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 6 01:24:38.867185 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 6 01:24:38.867193 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Sep 6 01:24:38.867202 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Sep 6 01:24:38.867210 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Sep 6 01:24:38.867219 kernel: Zone ranges: Sep 6 01:24:38.867227 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 01:24:38.867236 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Sep 6 01:24:38.867247 kernel: Normal empty Sep 6 01:24:38.867255 kernel: Movable zone start for each node Sep 6 01:24:38.867264 kernel: Early memory node ranges Sep 6 01:24:38.867272 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Sep 6 01:24:38.867281 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Sep 6 01:24:38.867289 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Sep 6 01:24:38.867298 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 01:24:38.867306 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Sep 6 01:24:38.867314 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Sep 6 01:24:38.867325 kernel: ACPI: PM-Timer IO Port: 0x608 Sep 6 01:24:38.867334 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 6 01:24:38.867342 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 6 01:24:38.867350 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 6 01:24:38.867359 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 6 01:24:38.867367 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 01:24:38.867376 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 6 01:24:38.867384 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 6 01:24:38.867393 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 01:24:38.867403 kernel: TSC deadline timer available Sep 6 01:24:38.867412 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Sep 6 01:24:38.867420 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Sep 6 01:24:38.867428 kernel: Booting paravirtualized kernel on KVM Sep 6 01:24:38.867437 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 01:24:38.867446 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Sep 6 01:24:38.867454 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Sep 6 01:24:38.867463 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Sep 6 01:24:38.867471 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 6 01:24:38.867482 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Sep 6 01:24:38.867490 kernel: kvm-guest: PV spinlocks enabled Sep 6 01:24:38.867499 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 01:24:38.867507 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Sep 6 01:24:38.867516 kernel: Policy zone: DMA32 Sep 6 01:24:38.867525 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:24:38.867534 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 01:24:38.867543 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 01:24:38.867553 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 01:24:38.867562 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 01:24:38.867571 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 192524K reserved, 0K cma-reserved) Sep 6 01:24:38.867579 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 6 01:24:38.867588 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 01:24:38.867596 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 01:24:38.867604 kernel: rcu: Hierarchical RCU implementation. Sep 6 01:24:38.867613 kernel: rcu: RCU event tracing is enabled. Sep 6 01:24:38.867622 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 6 01:24:38.867633 kernel: Rude variant of Tasks RCU enabled. Sep 6 01:24:38.867642 kernel: Tracing variant of Tasks RCU enabled. Sep 6 01:24:38.867650 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 01:24:38.867659 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 6 01:24:38.867667 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Sep 6 01:24:38.867675 kernel: random: crng init done Sep 6 01:24:38.867684 kernel: Console: colour VGA+ 80x25 Sep 6 01:24:38.867702 kernel: printk: console [tty0] enabled Sep 6 01:24:38.867711 kernel: printk: console [ttyS0] enabled Sep 6 01:24:38.867720 kernel: ACPI: Core revision 20210730 Sep 6 01:24:38.867729 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 01:24:38.867744 kernel: x2apic enabled Sep 6 01:24:38.867755 kernel: Switched APIC routing to physical x2apic. Sep 6 01:24:38.867765 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Sep 6 01:24:38.867774 kernel: Calibrating delay loop (skipped) preset value.. 4589.21 BogoMIPS (lpj=2294608) Sep 6 01:24:38.867783 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 6 01:24:38.867792 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 6 01:24:38.867803 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 6 01:24:38.867812 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 01:24:38.867821 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Sep 6 01:24:38.867830 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 6 01:24:38.867840 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 6 01:24:38.867848 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Sep 6 01:24:38.867857 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Sep 6 01:24:38.867866 kernel: RETBleed: Mitigation: Enhanced IBRS Sep 6 01:24:38.867875 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 6 01:24:38.867884 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 6 01:24:38.867895 kernel: TAA: Mitigation: Clear CPU buffers Sep 6 01:24:38.867904 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 6 01:24:38.867913 kernel: GDS: Unknown: Dependent on hypervisor status Sep 6 01:24:38.867922 kernel: active return thunk: its_return_thunk Sep 6 01:24:38.867931 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 01:24:38.867940 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 01:24:38.867949 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 01:24:38.867958 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 01:24:38.867967 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 6 01:24:38.867976 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 6 01:24:38.867985 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 6 01:24:38.867997 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Sep 6 01:24:38.868006 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 01:24:38.868015 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 6 01:24:38.868024 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 6 01:24:38.868033 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 6 01:24:38.868042 kernel: x86/fpu: xstate_offset[9]: 2432, xstate_sizes[9]: 8 Sep 6 01:24:38.868051 kernel: x86/fpu: Enabled xstate features 0x2e7, context size is 2440 bytes, using 'compacted' format. Sep 6 01:24:38.868060 kernel: Freeing SMP alternatives memory: 32K Sep 6 01:24:38.868068 kernel: pid_max: default: 32768 minimum: 301 Sep 6 01:24:38.868077 kernel: LSM: Security Framework initializing Sep 6 01:24:38.868086 kernel: SELinux: Initializing. Sep 6 01:24:38.868095 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 01:24:38.868107 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 01:24:38.870163 kernel: smpboot: CPU0: Intel Xeon Processor (Cascadelake) (family: 0x6, model: 0x55, stepping: 0x6) Sep 6 01:24:38.870174 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Sep 6 01:24:38.870184 kernel: signal: max sigframe size: 3632 Sep 6 01:24:38.870194 kernel: rcu: Hierarchical SRCU implementation. Sep 6 01:24:38.870203 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 01:24:38.870212 kernel: smp: Bringing up secondary CPUs ... Sep 6 01:24:38.870221 kernel: x86: Booting SMP configuration: Sep 6 01:24:38.870230 kernel: .... node #0, CPUs: #1 Sep 6 01:24:38.870239 kernel: kvm-clock: cpu 1, msr 6419f041, secondary cpu clock Sep 6 01:24:38.870252 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Sep 6 01:24:38.870261 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Sep 6 01:24:38.870271 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 01:24:38.870280 kernel: smpboot: Max logical packages: 16 Sep 6 01:24:38.870289 kernel: smpboot: Total of 2 processors activated (9178.43 BogoMIPS) Sep 6 01:24:38.870298 kernel: devtmpfs: initialized Sep 6 01:24:38.870308 kernel: x86/mm: Memory block size: 128MB Sep 6 01:24:38.870317 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 01:24:38.870326 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 6 01:24:38.870338 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 01:24:38.870347 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 01:24:38.870356 kernel: audit: initializing netlink subsys (disabled) Sep 6 01:24:38.870365 kernel: audit: type=2000 audit(1757121877.744:1): state=initialized audit_enabled=0 res=1 Sep 6 01:24:38.870374 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 01:24:38.870383 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 01:24:38.870392 kernel: cpuidle: using governor menu Sep 6 01:24:38.870401 kernel: ACPI: bus type PCI registered Sep 6 01:24:38.870410 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 01:24:38.870422 kernel: dca service started, version 1.12.1 Sep 6 01:24:38.870431 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Sep 6 01:24:38.870440 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Sep 6 01:24:38.870449 kernel: PCI: Using configuration type 1 for base access Sep 6 01:24:38.870458 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 01:24:38.870467 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 01:24:38.870477 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 01:24:38.870486 kernel: ACPI: Added _OSI(Module Device) Sep 6 01:24:38.870495 kernel: ACPI: Added _OSI(Processor Device) Sep 6 01:24:38.870506 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 01:24:38.870515 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 01:24:38.870524 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 01:24:38.870533 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 01:24:38.870542 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 01:24:38.870551 kernel: ACPI: Interpreter enabled Sep 6 01:24:38.870560 kernel: ACPI: PM: (supports S0 S5) Sep 6 01:24:38.870569 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 01:24:38.870579 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 01:24:38.870590 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Sep 6 01:24:38.870599 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 6 01:24:38.870764 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 6 01:24:38.870859 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 6 01:24:38.870952 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 6 01:24:38.870964 kernel: PCI host bridge to bus 0000:00 Sep 6 01:24:38.871055 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 6 01:24:38.871156 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 6 01:24:38.871233 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 6 01:24:38.871309 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Sep 6 01:24:38.871384 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 6 01:24:38.871460 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Sep 6 01:24:38.871536 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 6 01:24:38.871635 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Sep 6 01:24:38.871735 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Sep 6 01:24:38.871833 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Sep 6 01:24:38.871919 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Sep 6 01:24:38.872005 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Sep 6 01:24:38.872091 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 6 01:24:38.872194 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.872286 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Sep 6 01:24:38.872382 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.872470 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Sep 6 01:24:38.872565 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.872653 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Sep 6 01:24:38.872749 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.872839 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Sep 6 01:24:38.872930 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.873016 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Sep 6 01:24:38.873106 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.877260 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Sep 6 01:24:38.877362 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.877457 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Sep 6 01:24:38.877551 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Sep 6 01:24:38.877639 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Sep 6 01:24:38.877730 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Sep 6 01:24:38.877825 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Sep 6 01:24:38.877912 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Sep 6 01:24:38.877998 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Sep 6 01:24:38.878087 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Sep 6 01:24:38.878189 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Sep 6 01:24:38.878269 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Sep 6 01:24:38.878346 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Sep 6 01:24:38.878424 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Sep 6 01:24:38.878510 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Sep 6 01:24:38.878588 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Sep 6 01:24:38.878673 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Sep 6 01:24:38.878755 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Sep 6 01:24:38.878833 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Sep 6 01:24:38.878915 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Sep 6 01:24:38.878993 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Sep 6 01:24:38.879081 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Sep 6 01:24:38.879172 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Sep 6 01:24:38.879252 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 01:24:38.879336 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 01:24:38.879419 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:24:38.879519 kernel: pci_bus 0000:02: extended config space not accessible Sep 6 01:24:38.879629 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Sep 6 01:24:38.879734 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Sep 6 01:24:38.879838 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 01:24:38.879921 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 01:24:38.880017 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Sep 6 01:24:38.880106 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Sep 6 01:24:38.880204 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 01:24:38.880290 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 01:24:38.880380 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:24:38.880476 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Sep 6 01:24:38.880598 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Sep 6 01:24:38.880703 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 01:24:38.880819 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 01:24:38.880919 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:24:38.881024 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 01:24:38.884229 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 01:24:38.884347 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:24:38.884440 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 01:24:38.884527 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 01:24:38.884613 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:24:38.884699 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 01:24:38.884791 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 01:24:38.884877 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:24:38.884962 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 01:24:38.885050 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 01:24:38.888185 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:24:38.888283 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 01:24:38.888365 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 01:24:38.888444 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:24:38.888456 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 6 01:24:38.888465 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 6 01:24:38.888473 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 6 01:24:38.888485 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 6 01:24:38.888494 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Sep 6 01:24:38.888502 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Sep 6 01:24:38.888511 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Sep 6 01:24:38.888519 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Sep 6 01:24:38.888527 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Sep 6 01:24:38.888535 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Sep 6 01:24:38.888543 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Sep 6 01:24:38.888552 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Sep 6 01:24:38.888562 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Sep 6 01:24:38.888571 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Sep 6 01:24:38.888579 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Sep 6 01:24:38.888587 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Sep 6 01:24:38.888596 kernel: iommu: Default domain type: Translated Sep 6 01:24:38.888604 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 01:24:38.888706 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Sep 6 01:24:38.888798 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 6 01:24:38.888882 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Sep 6 01:24:38.888897 kernel: vgaarb: loaded Sep 6 01:24:38.888907 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 01:24:38.888916 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 01:24:38.888926 kernel: PTP clock support registered Sep 6 01:24:38.888935 kernel: PCI: Using ACPI for IRQ routing Sep 6 01:24:38.888944 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 6 01:24:38.888953 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Sep 6 01:24:38.888962 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Sep 6 01:24:38.888974 kernel: clocksource: Switched to clocksource kvm-clock Sep 6 01:24:38.888983 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 01:24:38.888992 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 01:24:38.889002 kernel: pnp: PnP ACPI init Sep 6 01:24:38.889096 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Sep 6 01:24:38.889125 kernel: pnp: PnP ACPI: found 5 devices Sep 6 01:24:38.889135 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 01:24:38.889144 kernel: NET: Registered PF_INET protocol family Sep 6 01:24:38.889154 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 01:24:38.889167 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 6 01:24:38.889176 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 01:24:38.889185 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 01:24:38.889194 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 6 01:24:38.889204 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 6 01:24:38.889213 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 01:24:38.889222 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 01:24:38.889232 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 01:24:38.889243 kernel: NET: Registered PF_XDP protocol family Sep 6 01:24:38.889333 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Sep 6 01:24:38.889423 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Sep 6 01:24:38.889509 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Sep 6 01:24:38.889596 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Sep 6 01:24:38.889683 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Sep 6 01:24:38.889777 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Sep 6 01:24:38.889868 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Sep 6 01:24:38.889954 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Sep 6 01:24:38.890040 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Sep 6 01:24:38.890158 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Sep 6 01:24:38.890243 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Sep 6 01:24:38.890329 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Sep 6 01:24:38.890433 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Sep 6 01:24:38.890520 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Sep 6 01:24:38.890605 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Sep 6 01:24:38.890689 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Sep 6 01:24:38.890787 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 01:24:38.890878 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 01:24:38.890965 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 01:24:38.891051 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Sep 6 01:24:38.891146 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 01:24:38.891237 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:24:38.891322 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 01:24:38.891408 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Sep 6 01:24:38.891493 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 01:24:38.891578 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:24:38.891669 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 01:24:38.891760 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Sep 6 01:24:38.891845 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 01:24:38.891931 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:24:38.892017 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 01:24:38.892103 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Sep 6 01:24:38.892196 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 01:24:38.892283 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:24:38.892367 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 01:24:38.892453 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Sep 6 01:24:38.892542 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 01:24:38.892627 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:24:38.892711 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 01:24:38.892802 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Sep 6 01:24:38.892886 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 01:24:38.892971 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:24:38.893054 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 01:24:38.900424 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Sep 6 01:24:38.900524 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 01:24:38.900606 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:24:38.900705 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 01:24:38.900800 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Sep 6 01:24:38.900887 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 01:24:38.900980 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:24:38.901063 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 6 01:24:38.901174 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 6 01:24:38.901252 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 6 01:24:38.901329 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Sep 6 01:24:38.901405 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Sep 6 01:24:38.901481 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Sep 6 01:24:38.901572 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Sep 6 01:24:38.901659 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Sep 6 01:24:38.901746 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:24:38.901836 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Sep 6 01:24:38.901924 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Sep 6 01:24:38.902007 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Sep 6 01:24:38.902088 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:24:38.902184 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Sep 6 01:24:38.902270 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Sep 6 01:24:38.902350 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:24:38.902437 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Sep 6 01:24:38.902520 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Sep 6 01:24:38.902603 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:24:38.902695 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Sep 6 01:24:38.902788 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Sep 6 01:24:38.902871 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:24:38.902960 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Sep 6 01:24:38.903043 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Sep 6 01:24:38.903131 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:24:38.903218 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Sep 6 01:24:38.903301 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Sep 6 01:24:38.903384 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:24:38.903471 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Sep 6 01:24:38.903551 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Sep 6 01:24:38.903631 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:24:38.903645 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Sep 6 01:24:38.903655 kernel: PCI: CLS 0 bytes, default 64 Sep 6 01:24:38.903665 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 6 01:24:38.903675 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Sep 6 01:24:38.903688 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 01:24:38.903698 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Sep 6 01:24:38.903708 kernel: Initialise system trusted keyrings Sep 6 01:24:38.903718 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 6 01:24:38.903727 kernel: Key type asymmetric registered Sep 6 01:24:38.903743 kernel: Asymmetric key parser 'x509' registered Sep 6 01:24:38.903752 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 01:24:38.903762 kernel: io scheduler mq-deadline registered Sep 6 01:24:38.903772 kernel: io scheduler kyber registered Sep 6 01:24:38.903784 kernel: io scheduler bfq registered Sep 6 01:24:38.903875 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Sep 6 01:24:38.903963 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Sep 6 01:24:38.904051 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.904155 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Sep 6 01:24:38.904244 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Sep 6 01:24:38.904332 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.904423 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Sep 6 01:24:38.904510 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Sep 6 01:24:38.904597 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.904687 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Sep 6 01:24:38.904782 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Sep 6 01:24:38.904870 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.904963 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Sep 6 01:24:38.905049 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Sep 6 01:24:38.905142 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.905231 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Sep 6 01:24:38.905317 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Sep 6 01:24:38.905405 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.905495 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Sep 6 01:24:38.905582 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Sep 6 01:24:38.905667 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.905761 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Sep 6 01:24:38.905849 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Sep 6 01:24:38.905936 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:24:38.905951 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 01:24:38.905962 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Sep 6 01:24:38.905973 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Sep 6 01:24:38.905983 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 01:24:38.905993 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 01:24:38.906003 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 6 01:24:38.906013 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 6 01:24:38.906023 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 6 01:24:38.906035 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 6 01:24:38.906138 kernel: rtc_cmos 00:03: RTC can wake from S4 Sep 6 01:24:38.906222 kernel: rtc_cmos 00:03: registered as rtc0 Sep 6 01:24:38.906303 kernel: rtc_cmos 00:03: setting system clock to 2025-09-06T01:24:38 UTC (1757121878) Sep 6 01:24:38.906382 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Sep 6 01:24:38.906395 kernel: intel_pstate: CPU model not supported Sep 6 01:24:38.906405 kernel: NET: Registered PF_INET6 protocol family Sep 6 01:24:38.906415 kernel: Segment Routing with IPv6 Sep 6 01:24:38.906430 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 01:24:38.906440 kernel: NET: Registered PF_PACKET protocol family Sep 6 01:24:38.906449 kernel: Key type dns_resolver registered Sep 6 01:24:38.906459 kernel: IPI shorthand broadcast: enabled Sep 6 01:24:38.906469 kernel: sched_clock: Marking stable (747355340, 116021279)->(1081412409, -218035790) Sep 6 01:24:38.906479 kernel: registered taskstats version 1 Sep 6 01:24:38.906489 kernel: Loading compiled-in X.509 certificates Sep 6 01:24:38.906498 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 01:24:38.906508 kernel: Key type .fscrypt registered Sep 6 01:24:38.906519 kernel: Key type fscrypt-provisioning registered Sep 6 01:24:38.906529 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 01:24:38.906539 kernel: ima: Allocated hash algorithm: sha1 Sep 6 01:24:38.906549 kernel: ima: No architecture policies found Sep 6 01:24:38.906559 kernel: clk: Disabling unused clocks Sep 6 01:24:38.906569 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 01:24:38.906579 kernel: Write protecting the kernel read-only data: 28672k Sep 6 01:24:38.906589 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 01:24:38.906601 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 01:24:38.906610 kernel: Run /init as init process Sep 6 01:24:38.906620 kernel: with arguments: Sep 6 01:24:38.906630 kernel: /init Sep 6 01:24:38.906640 kernel: with environment: Sep 6 01:24:38.906649 kernel: HOME=/ Sep 6 01:24:38.906659 kernel: TERM=linux Sep 6 01:24:38.906668 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 01:24:38.906681 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:24:38.906696 systemd[1]: Detected virtualization kvm. Sep 6 01:24:38.906706 systemd[1]: Detected architecture x86-64. Sep 6 01:24:38.906716 systemd[1]: Running in initrd. Sep 6 01:24:38.906726 systemd[1]: No hostname configured, using default hostname. Sep 6 01:24:38.906742 systemd[1]: Hostname set to . Sep 6 01:24:38.906753 systemd[1]: Initializing machine ID from VM UUID. Sep 6 01:24:38.906763 systemd[1]: Queued start job for default target initrd.target. Sep 6 01:24:38.906774 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:24:38.906786 systemd[1]: Reached target cryptsetup.target. Sep 6 01:24:38.906796 systemd[1]: Reached target paths.target. Sep 6 01:24:38.906806 systemd[1]: Reached target slices.target. Sep 6 01:24:38.906816 systemd[1]: Reached target swap.target. Sep 6 01:24:38.906826 systemd[1]: Reached target timers.target. Sep 6 01:24:38.906837 systemd[1]: Listening on iscsid.socket. Sep 6 01:24:38.906847 systemd[1]: Listening on iscsiuio.socket. Sep 6 01:24:38.906860 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 01:24:38.906871 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 01:24:38.906881 systemd[1]: Listening on systemd-journald.socket. Sep 6 01:24:38.906891 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:24:38.906901 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:24:38.906911 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:24:38.906922 systemd[1]: Reached target sockets.target. Sep 6 01:24:38.906932 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:24:38.906942 systemd[1]: Finished network-cleanup.service. Sep 6 01:24:38.906955 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 01:24:38.906965 systemd[1]: Starting systemd-journald.service... Sep 6 01:24:38.906975 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:24:38.906985 systemd[1]: Starting systemd-resolved.service... Sep 6 01:24:38.906995 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 01:24:38.907006 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:24:38.907016 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 01:24:38.907033 systemd-journald[202]: Journal started Sep 6 01:24:38.907089 systemd-journald[202]: Runtime Journal (/run/log/journal/cc6ebcbc0338454d9012f1a7f6966690) is 4.7M, max 38.1M, 33.3M free. Sep 6 01:24:38.850860 systemd-modules-load[203]: Inserted module 'overlay' Sep 6 01:24:38.929350 systemd[1]: Started systemd-journald.service. Sep 6 01:24:38.929381 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 01:24:38.929397 kernel: audit: type=1130 audit(1757121878.911:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.929410 kernel: audit: type=1130 audit(1757121878.917:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.929423 kernel: audit: type=1130 audit(1757121878.918:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.929435 kernel: audit: type=1130 audit(1757121878.918:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.898969 systemd-resolved[204]: Positive Trust Anchors: Sep 6 01:24:38.898984 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:24:38.931306 kernel: Bridge firewalling registered Sep 6 01:24:38.899017 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:24:38.909349 systemd-resolved[204]: Defaulting to hostname 'linux'. Sep 6 01:24:38.917809 systemd[1]: Started systemd-resolved.service. Sep 6 01:24:38.918311 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 01:24:38.918765 systemd[1]: Reached target nss-lookup.target. Sep 6 01:24:38.919919 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 01:24:38.930222 systemd-modules-load[203]: Inserted module 'br_netfilter' Sep 6 01:24:38.939270 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:24:38.944770 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 01:24:38.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.948515 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:24:38.949145 kernel: audit: type=1130 audit(1757121878.945:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.952175 kernel: audit: type=1130 audit(1757121878.949:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.953098 systemd[1]: Starting dracut-cmdline.service... Sep 6 01:24:38.960137 kernel: SCSI subsystem initialized Sep 6 01:24:38.964762 dracut-cmdline[219]: dracut-dracut-053 Sep 6 01:24:38.967791 dracut-cmdline[219]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:24:38.981762 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 01:24:38.981810 kernel: device-mapper: uevent: version 1.0.3 Sep 6 01:24:38.984140 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 01:24:38.987890 systemd-modules-load[203]: Inserted module 'dm_multipath' Sep 6 01:24:38.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.989063 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:24:38.994306 kernel: audit: type=1130 audit(1757121878.989:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:38.990240 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:24:39.002802 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:24:39.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.007153 kernel: audit: type=1130 audit(1757121879.003:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.068140 kernel: Loading iSCSI transport class v2.0-870. Sep 6 01:24:39.088131 kernel: iscsi: registered transport (tcp) Sep 6 01:24:39.116170 kernel: iscsi: registered transport (qla4xxx) Sep 6 01:24:39.116228 kernel: QLogic iSCSI HBA Driver Sep 6 01:24:39.163907 systemd[1]: Finished dracut-cmdline.service. Sep 6 01:24:39.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.173148 kernel: audit: type=1130 audit(1757121879.164:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.171875 systemd[1]: Starting dracut-pre-udev.service... Sep 6 01:24:39.235282 kernel: raid6: avx512x4 gen() 17623 MB/s Sep 6 01:24:39.252247 kernel: raid6: avx512x4 xor() 7630 MB/s Sep 6 01:24:39.269169 kernel: raid6: avx512x2 gen() 17644 MB/s Sep 6 01:24:39.286188 kernel: raid6: avx512x2 xor() 22023 MB/s Sep 6 01:24:39.303200 kernel: raid6: avx512x1 gen() 17611 MB/s Sep 6 01:24:39.320240 kernel: raid6: avx512x1 xor() 19642 MB/s Sep 6 01:24:39.337230 kernel: raid6: avx2x4 gen() 17617 MB/s Sep 6 01:24:39.354203 kernel: raid6: avx2x4 xor() 7237 MB/s Sep 6 01:24:39.371188 kernel: raid6: avx2x2 gen() 17564 MB/s Sep 6 01:24:39.388172 kernel: raid6: avx2x2 xor() 16525 MB/s Sep 6 01:24:39.405170 kernel: raid6: avx2x1 gen() 13397 MB/s Sep 6 01:24:39.422175 kernel: raid6: avx2x1 xor() 13938 MB/s Sep 6 01:24:39.439185 kernel: raid6: sse2x4 gen() 8232 MB/s Sep 6 01:24:39.456180 kernel: raid6: sse2x4 xor() 5479 MB/s Sep 6 01:24:39.473237 kernel: raid6: sse2x2 gen() 9106 MB/s Sep 6 01:24:39.490237 kernel: raid6: sse2x2 xor() 5331 MB/s Sep 6 01:24:39.507180 kernel: raid6: sse2x1 gen() 8236 MB/s Sep 6 01:24:39.524835 kernel: raid6: sse2x1 xor() 4167 MB/s Sep 6 01:24:39.524928 kernel: raid6: using algorithm avx512x2 gen() 17644 MB/s Sep 6 01:24:39.524965 kernel: raid6: .... xor() 22023 MB/s, rmw enabled Sep 6 01:24:39.525511 kernel: raid6: using avx512x2 recovery algorithm Sep 6 01:24:39.540164 kernel: xor: automatically using best checksumming function avx Sep 6 01:24:39.641177 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 01:24:39.660051 systemd[1]: Finished dracut-pre-udev.service. Sep 6 01:24:39.661727 systemd[1]: Starting systemd-udevd.service... Sep 6 01:24:39.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.660000 audit: BPF prog-id=7 op=LOAD Sep 6 01:24:39.661000 audit: BPF prog-id=8 op=LOAD Sep 6 01:24:39.679728 systemd-udevd[401]: Using default interface naming scheme 'v252'. Sep 6 01:24:39.684909 systemd[1]: Started systemd-udevd.service. Sep 6 01:24:39.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.690489 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 01:24:39.705048 dracut-pre-trigger[416]: rd.md=0: removing MD RAID activation Sep 6 01:24:39.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.736171 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 01:24:39.737329 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:24:39.789950 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:24:39.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:39.846132 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Sep 6 01:24:39.894963 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 01:24:39.894983 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 6 01:24:39.894996 kernel: GPT:17805311 != 125829119 Sep 6 01:24:39.895008 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 6 01:24:39.895020 kernel: GPT:17805311 != 125829119 Sep 6 01:24:39.895031 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 6 01:24:39.895042 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:24:39.895054 kernel: libata version 3.00 loaded. Sep 6 01:24:39.896132 kernel: ACPI: bus type USB registered Sep 6 01:24:39.898618 kernel: usbcore: registered new interface driver usbfs Sep 6 01:24:39.898670 kernel: usbcore: registered new interface driver hub Sep 6 01:24:39.898684 kernel: usbcore: registered new device driver usb Sep 6 01:24:39.903609 kernel: AVX2 version of gcm_enc/dec engaged. Sep 6 01:24:39.903651 kernel: AES CTR mode by8 optimization enabled Sep 6 01:24:39.918132 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (448) Sep 6 01:24:39.921686 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 01:24:40.002182 kernel: ahci 0000:00:1f.2: version 3.0 Sep 6 01:24:40.002337 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Sep 6 01:24:40.002352 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Sep 6 01:24:40.002442 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Sep 6 01:24:40.002534 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 01:24:40.002628 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Sep 6 01:24:40.002753 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Sep 6 01:24:40.002852 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 01:24:40.002953 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Sep 6 01:24:40.003049 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Sep 6 01:24:40.003154 kernel: hub 1-0:1.0: USB hub found Sep 6 01:24:40.003280 kernel: hub 1-0:1.0: 4 ports detected Sep 6 01:24:40.003387 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Sep 6 01:24:40.003570 kernel: hub 2-0:1.0: USB hub found Sep 6 01:24:40.003700 kernel: hub 2-0:1.0: 4 ports detected Sep 6 01:24:40.003806 kernel: scsi host0: ahci Sep 6 01:24:40.003911 kernel: scsi host1: ahci Sep 6 01:24:40.004019 kernel: scsi host2: ahci Sep 6 01:24:40.004109 kernel: scsi host3: ahci Sep 6 01:24:40.004212 kernel: scsi host4: ahci Sep 6 01:24:40.004304 kernel: scsi host5: ahci Sep 6 01:24:40.004399 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Sep 6 01:24:40.004411 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Sep 6 01:24:40.004422 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Sep 6 01:24:40.004432 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Sep 6 01:24:40.004443 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Sep 6 01:24:40.004454 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Sep 6 01:24:40.011260 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 01:24:40.011756 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 01:24:40.017104 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 01:24:40.021655 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:24:40.022917 systemd[1]: Starting disk-uuid.service... Sep 6 01:24:40.030335 disk-uuid[529]: Primary Header is updated. Sep 6 01:24:40.030335 disk-uuid[529]: Secondary Entries is updated. Sep 6 01:24:40.030335 disk-uuid[529]: Secondary Header is updated. Sep 6 01:24:40.035182 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:24:40.040126 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:24:40.189202 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Sep 6 01:24:40.267166 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 6 01:24:40.267288 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 6 01:24:40.273888 kernel: ata2: SATA link down (SStatus 0 SControl 300) Sep 6 01:24:40.273988 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 6 01:24:40.276135 kernel: ata1: SATA link down (SStatus 0 SControl 300) Sep 6 01:24:40.280152 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 6 01:24:40.332156 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 01:24:40.338153 kernel: usbcore: registered new interface driver usbhid Sep 6 01:24:40.338235 kernel: usbhid: USB HID core driver Sep 6 01:24:40.343520 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Sep 6 01:24:40.343590 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Sep 6 01:24:41.042158 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:24:41.042421 disk-uuid[530]: The operation has completed successfully. Sep 6 01:24:41.091593 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 01:24:41.092296 systemd[1]: Finished disk-uuid.service. Sep 6 01:24:41.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.100232 systemd[1]: Starting verity-setup.service... Sep 6 01:24:41.116151 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 6 01:24:41.159842 systemd[1]: Found device dev-mapper-usr.device. Sep 6 01:24:41.161666 systemd[1]: Mounting sysusr-usr.mount... Sep 6 01:24:41.164901 systemd[1]: Finished verity-setup.service. Sep 6 01:24:41.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.246669 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 01:24:41.246963 systemd[1]: Mounted sysusr-usr.mount. Sep 6 01:24:41.247886 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 01:24:41.249319 systemd[1]: Starting ignition-setup.service... Sep 6 01:24:41.251039 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 01:24:41.270924 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 01:24:41.270980 kernel: BTRFS info (device vda6): using free space tree Sep 6 01:24:41.270994 kernel: BTRFS info (device vda6): has skinny extents Sep 6 01:24:41.285370 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 01:24:41.292218 systemd[1]: Finished ignition-setup.service. Sep 6 01:24:41.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.293622 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 01:24:41.426693 ignition[620]: Ignition 2.14.0 Sep 6 01:24:41.426709 ignition[620]: Stage: fetch-offline Sep 6 01:24:41.426803 ignition[620]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:24:41.426834 ignition[620]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:24:41.428046 ignition[620]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:24:41.428175 ignition[620]: parsed url from cmdline: "" Sep 6 01:24:41.428179 ignition[620]: no config URL provided Sep 6 01:24:41.428185 ignition[620]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:24:41.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.431969 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 01:24:41.428193 ignition[620]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:24:41.428199 ignition[620]: failed to fetch config: resource requires networking Sep 6 01:24:41.428326 ignition[620]: Ignition finished successfully Sep 6 01:24:41.434151 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 01:24:41.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.435000 audit: BPF prog-id=9 op=LOAD Sep 6 01:24:41.436339 systemd[1]: Starting systemd-networkd.service... Sep 6 01:24:41.460903 systemd-networkd[712]: lo: Link UP Sep 6 01:24:41.460917 systemd-networkd[712]: lo: Gained carrier Sep 6 01:24:41.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.461512 systemd-networkd[712]: Enumeration completed Sep 6 01:24:41.461754 systemd-networkd[712]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:24:41.462986 systemd-networkd[712]: eth0: Link UP Sep 6 01:24:41.462990 systemd-networkd[712]: eth0: Gained carrier Sep 6 01:24:41.464249 systemd[1]: Started systemd-networkd.service. Sep 6 01:24:41.464838 systemd[1]: Reached target network.target. Sep 6 01:24:41.470526 systemd[1]: Starting ignition-fetch.service... Sep 6 01:24:41.473586 systemd[1]: Starting iscsiuio.service... Sep 6 01:24:41.476381 systemd-networkd[712]: eth0: DHCPv4 address 10.244.95.46/30, gateway 10.244.95.45 acquired from 10.244.95.45 Sep 6 01:24:41.484616 systemd[1]: Started iscsiuio.service. Sep 6 01:24:41.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.486121 systemd[1]: Starting iscsid.service... Sep 6 01:24:41.489993 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:24:41.489993 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 01:24:41.489993 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 01:24:41.489993 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 01:24:41.489993 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:24:41.489993 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 01:24:41.496182 ignition[714]: Ignition 2.14.0 Sep 6 01:24:41.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.496858 systemd[1]: Started iscsid.service. Sep 6 01:24:41.497157 ignition[714]: Stage: fetch Sep 6 01:24:41.498220 systemd[1]: Starting dracut-initqueue.service... Sep 6 01:24:41.497308 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:24:41.497327 ignition[714]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:24:41.500853 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:24:41.501506 ignition[714]: parsed url from cmdline: "" Sep 6 01:24:41.501565 ignition[714]: no config URL provided Sep 6 01:24:41.501951 ignition[714]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:24:41.502476 ignition[714]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:24:41.506713 ignition[714]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Sep 6 01:24:41.506843 ignition[714]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Sep 6 01:24:41.507529 ignition[714]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Sep 6 01:24:41.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.512693 systemd[1]: Finished dracut-initqueue.service. Sep 6 01:24:41.513696 systemd[1]: Reached target remote-fs-pre.target. Sep 6 01:24:41.514410 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:24:41.515190 systemd[1]: Reached target remote-fs.target. Sep 6 01:24:41.517416 systemd[1]: Starting dracut-pre-mount.service... Sep 6 01:24:41.527260 systemd[1]: Finished dracut-pre-mount.service. Sep 6 01:24:41.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.531797 ignition[714]: GET result: OK Sep 6 01:24:41.532393 ignition[714]: parsing config with SHA512: 16c48f100807d08c52ad65f716cbed46dfae3a5d04c4f78b72460fd0765761c59b212fc8500f75da9759037bf87dee9e53af59825798dce367b20309d037f33c Sep 6 01:24:41.537428 unknown[714]: fetched base config from "system" Sep 6 01:24:41.537989 unknown[714]: fetched base config from "system" Sep 6 01:24:41.538447 unknown[714]: fetched user config from "openstack" Sep 6 01:24:41.539201 ignition[714]: fetch: fetch complete Sep 6 01:24:41.539620 ignition[714]: fetch: fetch passed Sep 6 01:24:41.540040 ignition[714]: Ignition finished successfully Sep 6 01:24:41.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.541787 systemd[1]: Finished ignition-fetch.service. Sep 6 01:24:41.543211 systemd[1]: Starting ignition-kargs.service... Sep 6 01:24:41.560651 ignition[737]: Ignition 2.14.0 Sep 6 01:24:41.560671 ignition[737]: Stage: kargs Sep 6 01:24:41.560806 ignition[737]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:24:41.564726 systemd[1]: Finished ignition-kargs.service. Sep 6 01:24:41.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.560830 ignition[737]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:24:41.561839 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:24:41.562943 ignition[737]: kargs: kargs passed Sep 6 01:24:41.562995 ignition[737]: Ignition finished successfully Sep 6 01:24:41.567330 systemd[1]: Starting ignition-disks.service... Sep 6 01:24:41.578687 ignition[742]: Ignition 2.14.0 Sep 6 01:24:41.579368 ignition[742]: Stage: disks Sep 6 01:24:41.579880 ignition[742]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:24:41.580438 ignition[742]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:24:41.581541 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:24:41.583014 ignition[742]: disks: disks passed Sep 6 01:24:41.583473 ignition[742]: Ignition finished successfully Sep 6 01:24:41.584729 systemd[1]: Finished ignition-disks.service. Sep 6 01:24:41.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.585244 systemd[1]: Reached target initrd-root-device.target. Sep 6 01:24:41.585975 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:24:41.586646 systemd[1]: Reached target local-fs.target. Sep 6 01:24:41.587293 systemd[1]: Reached target sysinit.target. Sep 6 01:24:41.587912 systemd[1]: Reached target basic.target. Sep 6 01:24:41.589550 systemd[1]: Starting systemd-fsck-root.service... Sep 6 01:24:41.606655 systemd-fsck[749]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 6 01:24:41.609374 systemd[1]: Finished systemd-fsck-root.service. Sep 6 01:24:41.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.610650 systemd[1]: Mounting sysroot.mount... Sep 6 01:24:41.621128 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 01:24:41.621928 systemd[1]: Mounted sysroot.mount. Sep 6 01:24:41.622402 systemd[1]: Reached target initrd-root-fs.target. Sep 6 01:24:41.624978 systemd[1]: Mounting sysroot-usr.mount... Sep 6 01:24:41.625863 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 6 01:24:41.626724 systemd[1]: Starting flatcar-openstack-hostname.service... Sep 6 01:24:41.627182 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 01:24:41.627222 systemd[1]: Reached target ignition-diskful.target. Sep 6 01:24:41.637535 systemd[1]: Mounted sysroot-usr.mount. Sep 6 01:24:41.640512 systemd[1]: Starting initrd-setup-root.service... Sep 6 01:24:41.649153 initrd-setup-root[760]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 01:24:41.658487 initrd-setup-root[768]: cut: /sysroot/etc/group: No such file or directory Sep 6 01:24:41.676566 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 01:24:41.685658 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 01:24:41.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.724245 systemd[1]: Finished initrd-setup-root.service. Sep 6 01:24:41.725605 systemd[1]: Starting ignition-mount.service... Sep 6 01:24:41.727715 systemd[1]: Starting sysroot-boot.service... Sep 6 01:24:41.736448 bash[803]: umount: /sysroot/usr/share/oem: not mounted. Sep 6 01:24:41.747920 ignition[805]: INFO : Ignition 2.14.0 Sep 6 01:24:41.762359 ignition[805]: INFO : Stage: mount Sep 6 01:24:41.762359 ignition[805]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:24:41.762359 ignition[805]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:24:41.762359 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:24:41.762359 ignition[805]: INFO : mount: mount passed Sep 6 01:24:41.762359 ignition[805]: INFO : Ignition finished successfully Sep 6 01:24:41.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.767166 coreos-metadata[755]: Sep 06 01:24:41.757 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Sep 6 01:24:41.763038 systemd[1]: Finished ignition-mount.service. Sep 6 01:24:41.766239 systemd[1]: Finished sysroot-boot.service. Sep 6 01:24:41.775624 coreos-metadata[755]: Sep 06 01:24:41.775 INFO Fetch successful Sep 6 01:24:41.776134 coreos-metadata[755]: Sep 06 01:24:41.775 INFO wrote hostname srv-u6t8g.gb1.brightbox.com to /sysroot/etc/hostname Sep 6 01:24:41.778729 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Sep 6 01:24:41.778913 systemd[1]: Finished flatcar-openstack-hostname.service. Sep 6 01:24:41.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:41.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:42.182637 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 01:24:42.195177 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (813) Sep 6 01:24:42.201427 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 01:24:42.201485 kernel: BTRFS info (device vda6): using free space tree Sep 6 01:24:42.201506 kernel: BTRFS info (device vda6): has skinny extents Sep 6 01:24:42.207269 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 01:24:42.209802 systemd[1]: Starting ignition-files.service... Sep 6 01:24:42.228446 ignition[833]: INFO : Ignition 2.14.0 Sep 6 01:24:42.228446 ignition[833]: INFO : Stage: files Sep 6 01:24:42.229404 ignition[833]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:24:42.229404 ignition[833]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:24:42.230589 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:24:42.231095 ignition[833]: DEBUG : files: compiled without relabeling support, skipping Sep 6 01:24:42.232054 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 01:24:42.232054 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 01:24:42.234666 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 01:24:42.235336 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 01:24:42.236590 unknown[833]: wrote ssh authorized keys file for user: core Sep 6 01:24:42.237185 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 01:24:42.237185 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 6 01:24:42.239326 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 01:24:42.239326 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:24:42.239326 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:24:42.239326 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:24:42.239326 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:24:42.239326 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:24:42.239326 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Sep 6 01:24:42.602851 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Sep 6 01:24:42.848785 systemd-networkd[712]: eth0: Gained IPv6LL Sep 6 01:24:44.334012 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:24:44.334012 ignition[833]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 6 01:24:44.342918 ignition[833]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 6 01:24:44.342918 ignition[833]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 01:24:44.345391 ignition[833]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 01:24:44.357297 ignition[833]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:24:44.357297 ignition[833]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:24:44.357297 ignition[833]: INFO : files: files passed Sep 6 01:24:44.357297 ignition[833]: INFO : Ignition finished successfully Sep 6 01:24:44.366793 kernel: kauditd_printk_skb: 27 callbacks suppressed Sep 6 01:24:44.366848 kernel: audit: type=1130 audit(1757121884.361:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.360530 systemd[1]: Finished ignition-files.service. Sep 6 01:24:44.361636 systemd-networkd[712]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:17cb:24:19ff:fef4:5f2e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:17cb:24:19ff:fef4:5f2e/64 assigned by NDisc. Sep 6 01:24:44.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.361649 systemd-networkd[712]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 01:24:44.389095 kernel: audit: type=1130 audit(1757121884.379:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.390167 kernel: audit: type=1131 audit(1757121884.379:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.390187 kernel: audit: type=1130 audit(1757121884.385:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.390301 initrd-setup-root-after-ignition[858]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 01:24:44.364494 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 01:24:44.370919 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 01:24:44.371861 systemd[1]: Starting ignition-quench.service... Sep 6 01:24:44.377072 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 01:24:44.377262 systemd[1]: Finished ignition-quench.service. Sep 6 01:24:44.379944 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 01:24:44.385639 systemd[1]: Reached target ignition-complete.target. Sep 6 01:24:44.391306 systemd[1]: Starting initrd-parse-etc.service... Sep 6 01:24:44.410498 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 01:24:44.411241 systemd[1]: Finished initrd-parse-etc.service. Sep 6 01:24:44.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.412306 systemd[1]: Reached target initrd-fs.target. Sep 6 01:24:44.423605 kernel: audit: type=1130 audit(1757121884.411:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.423636 kernel: audit: type=1131 audit(1757121884.411:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.423087 systemd[1]: Reached target initrd.target. Sep 6 01:24:44.424230 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 01:24:44.425453 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 01:24:44.448815 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 01:24:44.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.450847 systemd[1]: Starting initrd-cleanup.service... Sep 6 01:24:44.456287 kernel: audit: type=1130 audit(1757121884.449:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.463166 systemd[1]: Stopped target nss-lookup.target. Sep 6 01:24:44.464181 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 01:24:44.465031 systemd[1]: Stopped target timers.target. Sep 6 01:24:44.465826 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 01:24:44.466399 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 01:24:44.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.469936 systemd[1]: Stopped target initrd.target. Sep 6 01:24:44.470606 kernel: audit: type=1131 audit(1757121884.467:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.470370 systemd[1]: Stopped target basic.target. Sep 6 01:24:44.470939 systemd[1]: Stopped target ignition-complete.target. Sep 6 01:24:44.471575 systemd[1]: Stopped target ignition-diskful.target. Sep 6 01:24:44.472185 systemd[1]: Stopped target initrd-root-device.target. Sep 6 01:24:44.480961 systemd[1]: Stopped target remote-fs.target. Sep 6 01:24:44.481661 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 01:24:44.482327 systemd[1]: Stopped target sysinit.target. Sep 6 01:24:44.482944 systemd[1]: Stopped target local-fs.target. Sep 6 01:24:44.483580 systemd[1]: Stopped target local-fs-pre.target. Sep 6 01:24:44.484211 systemd[1]: Stopped target swap.target. Sep 6 01:24:44.484811 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 01:24:44.488562 kernel: audit: type=1131 audit(1757121884.485:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.484949 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 01:24:44.485605 systemd[1]: Stopped target cryptsetup.target. Sep 6 01:24:44.492726 kernel: audit: type=1131 audit(1757121884.489:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.488915 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 01:24:44.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.489027 systemd[1]: Stopped dracut-initqueue.service. Sep 6 01:24:44.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.489672 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 01:24:44.489787 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 01:24:44.493232 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 01:24:44.493352 systemd[1]: Stopped ignition-files.service. Sep 6 01:24:44.494919 systemd[1]: Stopping ignition-mount.service... Sep 6 01:24:44.496378 iscsid[722]: iscsid shutting down. Sep 6 01:24:44.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.497250 systemd[1]: Stopping iscsid.service... Sep 6 01:24:44.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.498444 systemd[1]: Stopping sysroot-boot.service... Sep 6 01:24:44.498799 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 01:24:44.498951 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 01:24:44.499439 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 01:24:44.499531 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 01:24:44.501231 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 01:24:44.501337 systemd[1]: Stopped iscsid.service. Sep 6 01:24:44.502188 systemd[1]: Stopping iscsiuio.service... Sep 6 01:24:44.506149 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 01:24:44.506298 systemd[1]: Stopped iscsiuio.service. Sep 6 01:24:44.507590 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 01:24:44.513743 ignition[871]: INFO : Ignition 2.14.0 Sep 6 01:24:44.513743 ignition[871]: INFO : Stage: umount Sep 6 01:24:44.513743 ignition[871]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:24:44.513743 ignition[871]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:24:44.507695 systemd[1]: Finished initrd-cleanup.service. Sep 6 01:24:44.516369 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:24:44.517907 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 01:24:44.520143 ignition[871]: INFO : umount: umount passed Sep 6 01:24:44.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.523341 ignition[871]: INFO : Ignition finished successfully Sep 6 01:24:44.521012 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 01:24:44.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.521100 systemd[1]: Stopped ignition-mount.service. Sep 6 01:24:44.521775 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 01:24:44.521825 systemd[1]: Stopped ignition-disks.service. Sep 6 01:24:44.522223 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 01:24:44.522258 systemd[1]: Stopped ignition-kargs.service. Sep 6 01:24:44.522602 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 01:24:44.522634 systemd[1]: Stopped ignition-fetch.service. Sep 6 01:24:44.522980 systemd[1]: Stopped target network.target. Sep 6 01:24:44.523336 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 01:24:44.523373 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 01:24:44.524153 systemd[1]: Stopped target paths.target. Sep 6 01:24:44.524794 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 01:24:44.530149 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 01:24:44.530557 systemd[1]: Stopped target slices.target. Sep 6 01:24:44.531243 systemd[1]: Stopped target sockets.target. Sep 6 01:24:44.531894 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 01:24:44.531926 systemd[1]: Closed iscsid.socket. Sep 6 01:24:44.532507 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 01:24:44.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.532537 systemd[1]: Closed iscsiuio.socket. Sep 6 01:24:44.533162 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 01:24:44.533210 systemd[1]: Stopped ignition-setup.service. Sep 6 01:24:44.533865 systemd[1]: Stopping systemd-networkd.service... Sep 6 01:24:44.534794 systemd[1]: Stopping systemd-resolved.service... Sep 6 01:24:44.539225 systemd-networkd[712]: eth0: DHCPv6 lease lost Sep 6 01:24:44.540239 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 01:24:44.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.540345 systemd[1]: Stopped systemd-networkd.service. Sep 6 01:24:44.541524 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 01:24:44.541558 systemd[1]: Closed systemd-networkd.socket. Sep 6 01:24:44.542702 systemd[1]: Stopping network-cleanup.service... Sep 6 01:24:44.543125 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 01:24:44.544000 audit: BPF prog-id=9 op=UNLOAD Sep 6 01:24:44.543201 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 01:24:44.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.545736 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 01:24:44.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.545779 systemd[1]: Stopped systemd-sysctl.service. Sep 6 01:24:44.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.546592 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 01:24:44.546629 systemd[1]: Stopped systemd-modules-load.service. Sep 6 01:24:44.550220 systemd[1]: Stopping systemd-udevd.service... Sep 6 01:24:44.556366 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 01:24:44.556871 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 01:24:44.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.556962 systemd[1]: Stopped systemd-resolved.service. Sep 6 01:24:44.559000 audit: BPF prog-id=6 op=UNLOAD Sep 6 01:24:44.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.563378 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 01:24:44.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.563482 systemd[1]: Stopped network-cleanup.service. Sep 6 01:24:44.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.565934 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 01:24:44.566064 systemd[1]: Stopped systemd-udevd.service. Sep 6 01:24:44.567138 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 01:24:44.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.567234 systemd[1]: Stopped sysroot-boot.service. Sep 6 01:24:44.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.567794 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 01:24:44.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.567831 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 01:24:44.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.568386 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 01:24:44.568416 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 01:24:44.569151 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 01:24:44.569196 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 01:24:44.569883 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 01:24:44.569916 systemd[1]: Stopped dracut-cmdline.service. Sep 6 01:24:44.570675 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 01:24:44.570710 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 01:24:44.571473 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 01:24:44.571508 systemd[1]: Stopped initrd-setup-root.service. Sep 6 01:24:44.573045 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 01:24:44.573679 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 01:24:44.573750 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 01:24:44.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.580199 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 01:24:44.580247 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 01:24:44.581370 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 01:24:44.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.581412 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 01:24:44.591898 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 01:24:44.592458 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 01:24:44.592550 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 01:24:44.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.593453 systemd[1]: Reached target initrd-switch-root.target. Sep 6 01:24:44.594829 systemd[1]: Starting initrd-switch-root.service... Sep 6 01:24:44.606783 systemd[1]: Switching root. Sep 6 01:24:44.623037 systemd-journald[202]: Journal stopped Sep 6 01:24:47.665370 systemd-journald[202]: Received SIGTERM from PID 1 (n/a). Sep 6 01:24:47.665507 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 01:24:47.665532 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 01:24:47.665551 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 01:24:47.665564 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 01:24:47.665580 kernel: SELinux: policy capability open_perms=1 Sep 6 01:24:47.665597 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 01:24:47.665610 kernel: SELinux: policy capability always_check_network=0 Sep 6 01:24:47.665626 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 01:24:47.665641 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 01:24:47.665654 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 01:24:47.665667 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 01:24:47.665689 systemd[1]: Successfully loaded SELinux policy in 57.426ms. Sep 6 01:24:47.665715 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.068ms. Sep 6 01:24:47.665731 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:24:47.665753 systemd[1]: Detected virtualization kvm. Sep 6 01:24:47.665766 systemd[1]: Detected architecture x86-64. Sep 6 01:24:47.665783 systemd[1]: Detected first boot. Sep 6 01:24:47.665797 systemd[1]: Hostname set to . Sep 6 01:24:47.665811 systemd[1]: Initializing machine ID from VM UUID. Sep 6 01:24:47.665827 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 01:24:47.665843 systemd[1]: Populated /etc with preset unit settings. Sep 6 01:24:47.665858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:24:47.665880 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:24:47.665910 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:24:47.665932 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 01:24:47.665945 systemd[1]: Stopped initrd-switch-root.service. Sep 6 01:24:47.665962 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 01:24:47.665981 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 01:24:47.665997 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 01:24:47.666011 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 6 01:24:47.666026 systemd[1]: Created slice system-getty.slice. Sep 6 01:24:47.666043 systemd[1]: Created slice system-modprobe.slice. Sep 6 01:24:47.666062 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 01:24:47.666075 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 01:24:47.666089 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 01:24:47.666103 systemd[1]: Created slice user.slice. Sep 6 01:24:47.666158 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:24:47.666173 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 01:24:47.666189 systemd[1]: Set up automount boot.automount. Sep 6 01:24:47.666203 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 01:24:47.666217 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 01:24:47.666231 systemd[1]: Stopped target initrd-fs.target. Sep 6 01:24:47.666248 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 01:24:47.666261 systemd[1]: Reached target integritysetup.target. Sep 6 01:24:47.666278 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:24:47.666296 systemd[1]: Reached target remote-fs.target. Sep 6 01:24:47.666312 systemd[1]: Reached target slices.target. Sep 6 01:24:47.666326 systemd[1]: Reached target swap.target. Sep 6 01:24:47.666339 systemd[1]: Reached target torcx.target. Sep 6 01:24:47.666353 systemd[1]: Reached target veritysetup.target. Sep 6 01:24:47.666366 systemd[1]: Listening on systemd-coredump.socket. Sep 6 01:24:47.666383 systemd[1]: Listening on systemd-initctl.socket. Sep 6 01:24:47.666397 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:24:47.666411 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:24:47.666424 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:24:47.666437 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 01:24:47.666451 systemd[1]: Mounting dev-hugepages.mount... Sep 6 01:24:47.666470 systemd[1]: Mounting dev-mqueue.mount... Sep 6 01:24:47.666484 systemd[1]: Mounting media.mount... Sep 6 01:24:47.666498 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:24:47.666515 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 01:24:47.666531 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 01:24:47.666544 systemd[1]: Mounting tmp.mount... Sep 6 01:24:47.666558 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 01:24:47.666572 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:24:47.666587 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:24:47.666601 systemd[1]: Starting modprobe@configfs.service... Sep 6 01:24:47.666618 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:24:47.666631 systemd[1]: Starting modprobe@drm.service... Sep 6 01:24:47.666645 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:24:47.666664 systemd[1]: Starting modprobe@fuse.service... Sep 6 01:24:47.666677 systemd[1]: Starting modprobe@loop.service... Sep 6 01:24:47.666690 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 01:24:47.666704 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 01:24:47.666717 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 01:24:47.666731 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 01:24:47.666745 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 01:24:47.666759 systemd[1]: Stopped systemd-journald.service. Sep 6 01:24:47.666778 systemd[1]: Starting systemd-journald.service... Sep 6 01:24:47.666794 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:24:47.666807 systemd[1]: Starting systemd-network-generator.service... Sep 6 01:24:47.666820 systemd[1]: Starting systemd-remount-fs.service... Sep 6 01:24:47.666833 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:24:47.666850 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 01:24:47.666863 systemd[1]: Stopped verity-setup.service. Sep 6 01:24:47.666880 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:24:47.666911 systemd[1]: Mounted dev-hugepages.mount. Sep 6 01:24:47.666924 systemd[1]: Mounted dev-mqueue.mount. Sep 6 01:24:47.666941 systemd[1]: Mounted media.mount. Sep 6 01:24:47.666954 kernel: loop: module loaded Sep 6 01:24:47.666968 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 01:24:47.666981 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 01:24:47.666995 systemd[1]: Mounted tmp.mount. Sep 6 01:24:47.667008 kernel: fuse: init (API version 7.34) Sep 6 01:24:47.667025 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:24:47.667038 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 01:24:47.667052 systemd[1]: Finished modprobe@configfs.service. Sep 6 01:24:47.667068 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:24:47.667086 systemd-journald[976]: Journal started Sep 6 01:24:47.669700 systemd-journald[976]: Runtime Journal (/run/log/journal/cc6ebcbc0338454d9012f1a7f6966690) is 4.7M, max 38.1M, 33.3M free. Sep 6 01:24:47.669762 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:24:47.669798 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:24:44.775000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 01:24:44.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:24:44.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:24:44.837000 audit: BPF prog-id=10 op=LOAD Sep 6 01:24:44.837000 audit: BPF prog-id=10 op=UNLOAD Sep 6 01:24:44.837000 audit: BPF prog-id=11 op=LOAD Sep 6 01:24:44.837000 audit: BPF prog-id=11 op=UNLOAD Sep 6 01:24:44.930000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 01:24:44.930000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d88c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.930000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:24:44.932000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 01:24:44.932000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d965 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.932000 audit: CWD cwd="/" Sep 6 01:24:44.932000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:44.932000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:44.932000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:24:47.482000 audit: BPF prog-id=12 op=LOAD Sep 6 01:24:47.482000 audit: BPF prog-id=3 op=UNLOAD Sep 6 01:24:47.482000 audit: BPF prog-id=13 op=LOAD Sep 6 01:24:47.482000 audit: BPF prog-id=14 op=LOAD Sep 6 01:24:47.482000 audit: BPF prog-id=4 op=UNLOAD Sep 6 01:24:47.482000 audit: BPF prog-id=5 op=UNLOAD Sep 6 01:24:47.483000 audit: BPF prog-id=15 op=LOAD Sep 6 01:24:47.483000 audit: BPF prog-id=12 op=UNLOAD Sep 6 01:24:47.483000 audit: BPF prog-id=16 op=LOAD Sep 6 01:24:47.483000 audit: BPF prog-id=17 op=LOAD Sep 6 01:24:47.483000 audit: BPF prog-id=13 op=UNLOAD Sep 6 01:24:47.483000 audit: BPF prog-id=14 op=UNLOAD Sep 6 01:24:47.484000 audit: BPF prog-id=18 op=LOAD Sep 6 01:24:47.484000 audit: BPF prog-id=15 op=UNLOAD Sep 6 01:24:47.484000 audit: BPF prog-id=19 op=LOAD Sep 6 01:24:47.484000 audit: BPF prog-id=20 op=LOAD Sep 6 01:24:47.484000 audit: BPF prog-id=16 op=UNLOAD Sep 6 01:24:47.484000 audit: BPF prog-id=17 op=UNLOAD Sep 6 01:24:47.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.492000 audit: BPF prog-id=18 op=UNLOAD Sep 6 01:24:47.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.599000 audit: BPF prog-id=21 op=LOAD Sep 6 01:24:47.599000 audit: BPF prog-id=22 op=LOAD Sep 6 01:24:47.599000 audit: BPF prog-id=23 op=LOAD Sep 6 01:24:47.599000 audit: BPF prog-id=19 op=UNLOAD Sep 6 01:24:47.599000 audit: BPF prog-id=20 op=UNLOAD Sep 6 01:24:47.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.660000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 01:24:47.675731 systemd[1]: Finished modprobe@drm.service. Sep 6 01:24:47.675757 systemd[1]: Started systemd-journald.service. Sep 6 01:24:47.660000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc71fb2e90 a2=4000 a3=7ffc71fb2f2c items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:47.660000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 01:24:47.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.927608 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:24:47.479346 systemd[1]: Queued start job for default target multi-user.target. Sep 6 01:24:47.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:44.928279 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:24:47.479361 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 6 01:24:44.928329 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:24:47.484883 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 01:24:44.928389 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 01:24:47.674823 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:24:44.928412 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 01:24:47.674955 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:24:44.928478 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 01:24:47.675586 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 01:24:44.928506 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 01:24:47.677268 systemd[1]: Finished modprobe@fuse.service. Sep 6 01:24:44.928901 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 01:24:47.677826 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:24:44.928991 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:24:47.677979 systemd[1]: Finished modprobe@loop.service. Sep 6 01:24:44.929023 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:24:47.678560 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:24:44.930272 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 01:24:47.679164 systemd[1]: Finished systemd-network-generator.service. Sep 6 01:24:44.930309 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 01:24:47.679727 systemd[1]: Finished systemd-remount-fs.service. Sep 6 01:24:44.930330 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 01:24:47.680405 systemd[1]: Reached target network-pre.target. Sep 6 01:24:44.930346 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 01:24:47.682042 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 01:24:44.930364 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 01:24:47.684860 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 01:24:44.930381 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 01:24:47.685425 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 01:24:47.110189 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:47Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:24:47.687341 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 01:24:47.110513 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:47Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:24:47.689264 systemd[1]: Starting systemd-journal-flush.service... Sep 6 01:24:47.110830 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:47Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:24:47.690022 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:24:47.111189 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:47Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:24:47.692411 systemd[1]: Starting systemd-random-seed.service... Sep 6 01:24:47.111277 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:47Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 01:24:47.709262 systemd-journald[976]: Time spent on flushing to /var/log/journal/cc6ebcbc0338454d9012f1a7f6966690 is 45.869ms for 1297 entries. Sep 6 01:24:47.709262 systemd-journald[976]: System Journal (/var/log/journal/cc6ebcbc0338454d9012f1a7f6966690) is 8.0M, max 584.8M, 576.8M free. Sep 6 01:24:47.776300 systemd-journald[976]: Received client request to flush runtime journal. Sep 6 01:24:47.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.692859 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:24:47.111358 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:24:47Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 01:24:47.693963 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:24:47.696569 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 01:24:47.697239 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 01:24:47.724580 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 01:24:47.727238 systemd[1]: Starting systemd-sysusers.service... Sep 6 01:24:47.728223 systemd[1]: Finished systemd-random-seed.service. Sep 6 01:24:47.728739 systemd[1]: Reached target first-boot-complete.target. Sep 6 01:24:47.742277 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:24:47.755535 systemd[1]: Finished systemd-sysusers.service. Sep 6 01:24:47.757242 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:24:47.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.778518 systemd[1]: Finished systemd-journal-flush.service. Sep 6 01:24:47.791298 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:24:47.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.793154 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:24:47.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:47.794784 systemd[1]: Starting systemd-udev-settle.service... Sep 6 01:24:47.804315 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 6 01:24:48.288786 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 01:24:48.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.291000 audit: BPF prog-id=24 op=LOAD Sep 6 01:24:48.291000 audit: BPF prog-id=25 op=LOAD Sep 6 01:24:48.291000 audit: BPF prog-id=7 op=UNLOAD Sep 6 01:24:48.291000 audit: BPF prog-id=8 op=UNLOAD Sep 6 01:24:48.293330 systemd[1]: Starting systemd-udevd.service... Sep 6 01:24:48.313045 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Sep 6 01:24:48.335310 systemd[1]: Started systemd-udevd.service. Sep 6 01:24:48.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.344000 audit: BPF prog-id=26 op=LOAD Sep 6 01:24:48.346020 systemd[1]: Starting systemd-networkd.service... Sep 6 01:24:48.356000 audit: BPF prog-id=27 op=LOAD Sep 6 01:24:48.356000 audit: BPF prog-id=28 op=LOAD Sep 6 01:24:48.356000 audit: BPF prog-id=29 op=LOAD Sep 6 01:24:48.357260 systemd[1]: Starting systemd-userdbd.service... Sep 6 01:24:48.397049 systemd[1]: Started systemd-userdbd.service. Sep 6 01:24:48.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.398751 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 01:24:48.467136 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Sep 6 01:24:48.481162 kernel: ACPI: button: Power Button [PWRF] Sep 6 01:24:48.483719 systemd-networkd[1031]: lo: Link UP Sep 6 01:24:48.483729 systemd-networkd[1031]: lo: Gained carrier Sep 6 01:24:48.484811 systemd-networkd[1031]: Enumeration completed Sep 6 01:24:48.484946 systemd[1]: Started systemd-networkd.service. Sep 6 01:24:48.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.485743 systemd-networkd[1031]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:24:48.487299 systemd-networkd[1031]: eth0: Link UP Sep 6 01:24:48.487308 systemd-networkd[1031]: eth0: Gained carrier Sep 6 01:24:48.496175 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 01:24:48.496270 systemd-networkd[1031]: eth0: DHCPv4 address 10.244.95.46/30, gateway 10.244.95.45 acquired from 10.244.95.45 Sep 6 01:24:48.519132 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:24:48.515000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 01:24:48.515000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b5ca0bf5d0 a1=338ec a2=7fb201a28bc5 a3=5 items=110 ppid=1016 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:48.515000 audit: CWD cwd="/" Sep 6 01:24:48.515000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=1 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=2 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=3 name=(null) inode=13779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=4 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=5 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=6 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=7 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=8 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=9 name=(null) inode=13782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=10 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=11 name=(null) inode=13783 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=12 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=13 name=(null) inode=13784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=14 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=15 name=(null) inode=13785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=16 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=17 name=(null) inode=13786 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=18 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=19 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=20 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=21 name=(null) inode=13788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=22 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=23 name=(null) inode=13789 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=24 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=25 name=(null) inode=13790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=26 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=27 name=(null) inode=13791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=28 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=29 name=(null) inode=13792 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=30 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=31 name=(null) inode=13793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=32 name=(null) inode=13793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=33 name=(null) inode=13794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=34 name=(null) inode=13793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=35 name=(null) inode=13795 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=36 name=(null) inode=13793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=37 name=(null) inode=13796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=38 name=(null) inode=13793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=39 name=(null) inode=13797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=40 name=(null) inode=13793 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=41 name=(null) inode=13798 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=42 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=43 name=(null) inode=13799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=44 name=(null) inode=13799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=45 name=(null) inode=13800 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=46 name=(null) inode=13799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=47 name=(null) inode=13801 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=48 name=(null) inode=13799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=49 name=(null) inode=13802 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=50 name=(null) inode=13799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=51 name=(null) inode=13803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=52 name=(null) inode=13799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=53 name=(null) inode=13804 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=55 name=(null) inode=13805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=56 name=(null) inode=13805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=57 name=(null) inode=13806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=58 name=(null) inode=13805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=59 name=(null) inode=13807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=60 name=(null) inode=13805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=61 name=(null) inode=13808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=62 name=(null) inode=13808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=63 name=(null) inode=13809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=64 name=(null) inode=13808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=65 name=(null) inode=13810 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=66 name=(null) inode=13808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=67 name=(null) inode=13811 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=68 name=(null) inode=13808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=69 name=(null) inode=13812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=70 name=(null) inode=13808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=71 name=(null) inode=13813 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=72 name=(null) inode=13805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=73 name=(null) inode=13814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=74 name=(null) inode=13814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=75 name=(null) inode=13815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=76 name=(null) inode=13814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=77 name=(null) inode=13816 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=78 name=(null) inode=13814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=79 name=(null) inode=13817 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=80 name=(null) inode=13814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=81 name=(null) inode=13818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=82 name=(null) inode=13814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=83 name=(null) inode=13819 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=84 name=(null) inode=13805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=85 name=(null) inode=13820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=86 name=(null) inode=13820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=87 name=(null) inode=13821 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=88 name=(null) inode=13820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=89 name=(null) inode=13822 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=90 name=(null) inode=13820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=91 name=(null) inode=13823 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=92 name=(null) inode=13820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=93 name=(null) inode=13824 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=94 name=(null) inode=13820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=95 name=(null) inode=13825 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=96 name=(null) inode=13805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=97 name=(null) inode=13826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=98 name=(null) inode=13826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=99 name=(null) inode=13827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=100 name=(null) inode=13826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=101 name=(null) inode=13828 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=102 name=(null) inode=13826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=103 name=(null) inode=13829 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=104 name=(null) inode=13826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=105 name=(null) inode=13830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=106 name=(null) inode=13826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=107 name=(null) inode=13831 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PATH item=109 name=(null) inode=13832 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:48.515000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 01:24:48.539128 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Sep 6 01:24:48.544371 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Sep 6 01:24:48.544530 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Sep 6 01:24:48.560127 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Sep 6 01:24:48.745983 systemd[1]: Finished systemd-udev-settle.service. Sep 6 01:24:48.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.749574 systemd[1]: Starting lvm2-activation-early.service... Sep 6 01:24:48.774969 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:24:48.803294 systemd[1]: Finished lvm2-activation-early.service. Sep 6 01:24:48.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.804663 systemd[1]: Reached target cryptsetup.target. Sep 6 01:24:48.808636 systemd[1]: Starting lvm2-activation.service... Sep 6 01:24:48.818664 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:24:48.843826 systemd[1]: Finished lvm2-activation.service. Sep 6 01:24:48.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.845196 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:24:48.846253 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 01:24:48.846320 systemd[1]: Reached target local-fs.target. Sep 6 01:24:48.847307 systemd[1]: Reached target machines.target. Sep 6 01:24:48.851452 systemd[1]: Starting ldconfig.service... Sep 6 01:24:48.853232 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:24:48.853337 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:24:48.855658 systemd[1]: Starting systemd-boot-update.service... Sep 6 01:24:48.858519 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 01:24:48.865670 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 01:24:48.869275 systemd[1]: Starting systemd-sysext.service... Sep 6 01:24:48.871980 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Sep 6 01:24:48.873157 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 01:24:48.893281 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 01:24:48.899178 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 01:24:48.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.900097 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 01:24:48.900293 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 01:24:48.944468 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 01:24:48.945069 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 01:24:48.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.946125 kernel: loop0: detected capacity change from 0 to 221472 Sep 6 01:24:48.969130 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 01:24:48.992139 kernel: loop1: detected capacity change from 0 to 221472 Sep 6 01:24:48.993859 systemd-fsck[1057]: fsck.fat 4.2 (2021-01-31) Sep 6 01:24:48.993859 systemd-fsck[1057]: /dev/vda1: 790 files, 120761/258078 clusters Sep 6 01:24:48.995982 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 01:24:48.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:48.997829 systemd[1]: Mounting boot.mount... Sep 6 01:24:49.008711 (sd-sysext)[1060]: Using extensions 'kubernetes'. Sep 6 01:24:49.009551 systemd[1]: Mounted boot.mount. Sep 6 01:24:49.010031 (sd-sysext)[1060]: Merged extensions into '/usr'. Sep 6 01:24:49.031525 systemd[1]: Finished systemd-boot-update.service. Sep 6 01:24:49.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.032708 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:24:49.034425 systemd[1]: Mounting usr-share-oem.mount... Sep 6 01:24:49.038840 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.040737 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:24:49.043183 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:24:49.044698 systemd[1]: Starting modprobe@loop.service... Sep 6 01:24:49.045136 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.045236 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:24:49.045334 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:24:49.048967 systemd[1]: Mounted usr-share-oem.mount. Sep 6 01:24:49.050101 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:24:49.050266 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:24:49.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.050859 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:24:49.050968 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:24:49.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.051581 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:24:49.051690 systemd[1]: Finished modprobe@loop.service. Sep 6 01:24:49.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.053181 systemd[1]: Finished systemd-sysext.service. Sep 6 01:24:49.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.054604 systemd[1]: Starting ensure-sysext.service... Sep 6 01:24:49.059227 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:24:49.059281 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.061323 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 01:24:49.064826 systemd[1]: Reloading. Sep 6 01:24:49.084874 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 01:24:49.088575 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 01:24:49.090432 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 01:24:49.182043 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-09-06T01:24:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:24:49.182454 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-09-06T01:24:49Z" level=info msg="torcx already run" Sep 6 01:24:49.190003 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 01:24:49.279964 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:24:49.279993 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:24:49.299135 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:24:49.353000 audit: BPF prog-id=30 op=LOAD Sep 6 01:24:49.353000 audit: BPF prog-id=21 op=UNLOAD Sep 6 01:24:49.353000 audit: BPF prog-id=31 op=LOAD Sep 6 01:24:49.354000 audit: BPF prog-id=32 op=LOAD Sep 6 01:24:49.354000 audit: BPF prog-id=22 op=UNLOAD Sep 6 01:24:49.354000 audit: BPF prog-id=23 op=UNLOAD Sep 6 01:24:49.354000 audit: BPF prog-id=33 op=LOAD Sep 6 01:24:49.354000 audit: BPF prog-id=34 op=LOAD Sep 6 01:24:49.355000 audit: BPF prog-id=24 op=UNLOAD Sep 6 01:24:49.355000 audit: BPF prog-id=25 op=UNLOAD Sep 6 01:24:49.356000 audit: BPF prog-id=35 op=LOAD Sep 6 01:24:49.356000 audit: BPF prog-id=27 op=UNLOAD Sep 6 01:24:49.357000 audit: BPF prog-id=36 op=LOAD Sep 6 01:24:49.357000 audit: BPF prog-id=37 op=LOAD Sep 6 01:24:49.357000 audit: BPF prog-id=28 op=UNLOAD Sep 6 01:24:49.357000 audit: BPF prog-id=29 op=UNLOAD Sep 6 01:24:49.358000 audit: BPF prog-id=38 op=LOAD Sep 6 01:24:49.358000 audit: BPF prog-id=26 op=UNLOAD Sep 6 01:24:49.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.361420 systemd[1]: Finished ldconfig.service. Sep 6 01:24:49.362262 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 01:24:49.364720 kernel: kauditd_printk_skb: 267 callbacks suppressed Sep 6 01:24:49.364875 kernel: audit: type=1130 audit(1757121889.362:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.372409 systemd[1]: Starting audit-rules.service... Sep 6 01:24:49.374442 systemd[1]: Starting clean-ca-certificates.service... Sep 6 01:24:49.385753 kernel: audit: type=1334 audit(1757121889.381:194): prog-id=39 op=LOAD Sep 6 01:24:49.385822 kernel: audit: type=1334 audit(1757121889.383:195): prog-id=40 op=LOAD Sep 6 01:24:49.381000 audit: BPF prog-id=39 op=LOAD Sep 6 01:24:49.383000 audit: BPF prog-id=40 op=LOAD Sep 6 01:24:49.378229 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 01:24:49.382402 systemd[1]: Starting systemd-resolved.service... Sep 6 01:24:49.385343 systemd[1]: Starting systemd-timesyncd.service... Sep 6 01:24:49.387296 systemd[1]: Starting systemd-update-utmp.service... Sep 6 01:24:49.388498 systemd[1]: Finished clean-ca-certificates.service. Sep 6 01:24:49.394389 kernel: audit: type=1130 audit(1757121889.389:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.391954 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:24:49.405714 kernel: audit: type=1127 audit(1757121889.400:197): pid=1141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.400000 audit[1141]: SYSTEM_BOOT pid=1141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.400971 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.404290 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:24:49.406494 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:24:49.409650 systemd[1]: Starting modprobe@loop.service... Sep 6 01:24:49.410127 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.410314 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:24:49.410842 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:24:49.411716 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:24:49.411884 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:24:49.419390 kernel: audit: type=1130 audit(1757121889.413:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.419454 kernel: audit: type=1131 audit(1757121889.413:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.413591 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:24:49.413710 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:24:49.423051 kernel: audit: type=1130 audit(1757121889.419:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.420022 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:24:49.420169 systemd[1]: Finished modprobe@loop.service. Sep 6 01:24:49.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.424132 kernel: audit: type=1131 audit(1757121889.419:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.428755 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:24:49.428935 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.430646 kernel: audit: type=1130 audit(1757121889.426:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.431255 systemd[1]: Finished systemd-update-utmp.service. Sep 6 01:24:49.434440 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.435947 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:24:49.438781 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:24:49.440462 systemd[1]: Starting modprobe@loop.service... Sep 6 01:24:49.441343 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.441506 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:24:49.441660 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:24:49.443539 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:24:49.443658 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:24:49.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.444436 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:24:49.444553 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:24:49.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.445208 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:24:49.446473 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:24:49.446612 systemd[1]: Finished modprobe@loop.service. Sep 6 01:24:49.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.450824 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.452010 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:24:49.454715 systemd[1]: Starting modprobe@drm.service... Sep 6 01:24:49.457063 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:24:49.459729 systemd[1]: Starting modprobe@loop.service... Sep 6 01:24:49.460625 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.460784 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:24:49.463464 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 01:24:49.463922 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:24:49.465124 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:24:49.466307 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:24:49.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.467094 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:24:49.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.468161 systemd[1]: Finished modprobe@drm.service. Sep 6 01:24:49.474216 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:24:49.474332 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:24:49.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.474794 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:24:49.476705 systemd[1]: Finished ensure-sysext.service. Sep 6 01:24:49.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.477527 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 01:24:49.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.479284 systemd[1]: Starting systemd-update-done.service... Sep 6 01:24:49.481589 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:24:49.481727 systemd[1]: Finished modprobe@loop.service. Sep 6 01:24:49.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.482327 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.486840 systemd[1]: Finished systemd-update-done.service. Sep 6 01:24:49.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:49.512000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 01:24:49.512000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd8681c930 a2=420 a3=0 items=0 ppid=1135 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:49.512000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 01:24:49.513181 augenrules[1167]: No rules Sep 6 01:24:49.513402 systemd[1]: Finished audit-rules.service. Sep 6 01:24:49.520637 systemd[1]: Started systemd-timesyncd.service. Sep 6 01:24:49.521040 systemd[1]: Reached target time-set.target. Sep 6 01:24:49.530466 systemd-resolved[1138]: Positive Trust Anchors: Sep 6 01:24:49.530795 systemd-resolved[1138]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:24:49.530892 systemd-resolved[1138]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:24:49.536698 systemd-resolved[1138]: Using system hostname 'srv-u6t8g.gb1.brightbox.com'. Sep 6 01:24:49.538648 systemd[1]: Started systemd-resolved.service. Sep 6 01:24:49.551995 systemd[1]: Reached target network.target. Sep 6 01:24:49.552411 systemd[1]: Reached target nss-lookup.target. Sep 6 01:24:49.552780 systemd[1]: Reached target sysinit.target. Sep 6 01:24:49.553210 systemd[1]: Started motdgen.path. Sep 6 01:24:49.553571 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 01:24:49.554153 systemd[1]: Started logrotate.timer. Sep 6 01:24:49.554573 systemd[1]: Started mdadm.timer. Sep 6 01:24:49.554919 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 01:24:49.555287 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 01:24:49.555318 systemd[1]: Reached target paths.target. Sep 6 01:24:49.555647 systemd[1]: Reached target timers.target. Sep 6 01:24:49.556602 systemd[1]: Listening on dbus.socket. Sep 6 01:24:49.558186 systemd[1]: Starting docker.socket... Sep 6 01:24:49.561762 systemd[1]: Listening on sshd.socket. Sep 6 01:24:49.562366 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:24:49.562851 systemd[1]: Listening on docker.socket. Sep 6 01:24:49.563265 systemd[1]: Reached target sockets.target. Sep 6 01:24:49.563571 systemd[1]: Reached target basic.target. Sep 6 01:24:49.563918 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.563947 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:24:49.565092 systemd[1]: Starting containerd.service... Sep 6 01:24:49.566774 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 6 01:24:49.569021 systemd[1]: Starting dbus.service... Sep 6 01:24:49.571857 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 01:24:49.578958 jq[1180]: false Sep 6 01:24:49.579166 systemd[1]: Starting extend-filesystems.service... Sep 6 01:24:49.579679 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 01:24:49.581911 systemd[1]: Starting motdgen.service... Sep 6 01:24:49.583631 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 01:24:49.586315 systemd[1]: Starting sshd-keygen.service... Sep 6 01:24:49.591423 systemd[1]: Starting systemd-logind.service... Sep 6 01:24:49.592067 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:24:49.592204 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 01:24:49.592854 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 01:24:49.595436 systemd[1]: Starting update-engine.service... Sep 6 01:24:49.599851 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 01:24:49.603102 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 01:24:49.604282 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 01:24:49.608835 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 01:24:49.609041 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 01:24:49.625745 jq[1191]: true Sep 6 01:24:49.630161 dbus-daemon[1177]: [system] SELinux support is enabled Sep 6 01:24:49.630617 systemd[1]: Started dbus.service. Sep 6 01:24:49.633901 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 01:24:49.633955 systemd[1]: Reached target system-config.target. Sep 6 01:24:49.634409 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 01:24:49.634439 systemd[1]: Reached target user-config.target. Sep 6 01:24:49.635436 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1031 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 6 01:24:49.644160 extend-filesystems[1181]: Found loop1 Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda1 Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda2 Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda3 Sep 6 01:24:49.644160 extend-filesystems[1181]: Found usr Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda4 Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda6 Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda7 Sep 6 01:24:49.644160 extend-filesystems[1181]: Found vda9 Sep 6 01:24:49.644160 extend-filesystems[1181]: Checking size of /dev/vda9 Sep 6 01:24:49.642906 systemd[1]: Starting systemd-hostnamed.service... Sep 6 01:24:49.651576 jq[1194]: true Sep 6 01:24:49.695723 bash[1225]: Updated "/home/core/.ssh/authorized_keys" Sep 6 01:24:49.696249 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 01:24:49.698102 systemd-networkd[1031]: eth0: Gained IPv6LL Sep 6 01:24:49.700283 update_engine[1188]: I0906 01:24:49.699223 1188 main.cc:92] Flatcar Update Engine starting Sep 6 01:24:49.700819 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 01:24:49.701336 systemd[1]: Reached target network-online.target. Sep 6 01:24:49.704324 systemd[1]: Starting kubelet.service... Sep 6 01:24:49.705459 systemd[1]: Started update-engine.service. Sep 6 01:24:49.706472 update_engine[1188]: I0906 01:24:49.706342 1188 update_check_scheduler.cc:74] Next update check in 11m48s Sep 6 01:24:49.707631 systemd[1]: Started locksmithd.service. Sep 6 01:24:49.711025 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 01:24:49.711262 systemd[1]: Finished motdgen.service. Sep 6 01:24:49.720444 extend-filesystems[1181]: Resized partition /dev/vda9 Sep 6 01:24:49.721963 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) Sep 6 01:24:49.726138 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Sep 6 01:24:49.780429 env[1193]: time="2025-09-06T01:24:49.780370809Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 01:24:49.804931 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Sep 6 01:24:49.813173 systemd-logind[1185]: Watching system buttons on /dev/input/event2 (Power Button) Sep 6 01:24:49.813200 systemd-logind[1185]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 01:24:49.816208 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 6 01:24:49.816208 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 8 Sep 6 01:24:49.816208 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Sep 6 01:24:49.821273 extend-filesystems[1181]: Resized filesystem in /dev/vda9 Sep 6 01:24:49.816405 systemd-logind[1185]: New seat seat0. Sep 6 01:24:49.817085 systemd-timesyncd[1139]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). Sep 6 01:24:49.817208 systemd-timesyncd[1139]: Initial clock synchronization to Sat 2025-09-06 01:24:50.055441 UTC. Sep 6 01:24:49.817960 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 01:24:49.818141 systemd[1]: Finished extend-filesystems.service. Sep 6 01:24:49.821274 systemd[1]: Started systemd-logind.service. Sep 6 01:24:49.846404 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 6 01:24:49.846524 systemd[1]: Started systemd-hostnamed.service. Sep 6 01:24:49.849552 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1200 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 6 01:24:49.852772 systemd[1]: Starting polkit.service... Sep 6 01:24:49.880044 env[1193]: time="2025-09-06T01:24:49.879830930Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 01:24:49.880044 env[1193]: time="2025-09-06T01:24:49.879999542Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:24:49.879901 polkitd[1237]: Started polkitd version 121 Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887136225Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887169536Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887381713Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887400980Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887419691Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887430024Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887510443Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:24:49.887813 env[1193]: time="2025-09-06T01:24:49.887776368Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:24:49.890721 env[1193]: time="2025-09-06T01:24:49.890651237Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:24:49.890721 env[1193]: time="2025-09-06T01:24:49.890685548Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 01:24:49.890944 env[1193]: time="2025-09-06T01:24:49.890764497Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 01:24:49.890944 env[1193]: time="2025-09-06T01:24:49.890776755Z" level=info msg="metadata content store policy set" policy=shared Sep 6 01:24:49.896443 env[1193]: time="2025-09-06T01:24:49.896343174Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 01:24:49.896443 env[1193]: time="2025-09-06T01:24:49.896376330Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 01:24:49.896443 env[1193]: time="2025-09-06T01:24:49.896392779Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 01:24:49.896443 env[1193]: time="2025-09-06T01:24:49.896444058Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896612 env[1193]: time="2025-09-06T01:24:49.896462263Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896735715Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896756049Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896777303Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896795989Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896813070Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896830050Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896847991Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 01:24:49.896956 env[1193]: time="2025-09-06T01:24:49.896946987Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 01:24:49.897230 env[1193]: time="2025-09-06T01:24:49.897037585Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897374342Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897421908Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897442980Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897527337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897543923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897558992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897572028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897584681Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897597045Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897607998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897626028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.897777 env[1193]: time="2025-09-06T01:24:49.897641864Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 01:24:49.898170 env[1193]: time="2025-09-06T01:24:49.898072745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.898170 env[1193]: time="2025-09-06T01:24:49.898090335Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.898170 env[1193]: time="2025-09-06T01:24:49.898102942Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.898170 env[1193]: time="2025-09-06T01:24:49.898126436Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 01:24:49.898170 env[1193]: time="2025-09-06T01:24:49.898148176Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 01:24:49.898170 env[1193]: time="2025-09-06T01:24:49.898160083Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 01:24:49.898344 env[1193]: time="2025-09-06T01:24:49.898193292Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 01:24:49.899958 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:24:49.900036 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:24:49.900796 env[1193]: time="2025-09-06T01:24:49.900696241Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 01:24:49.901742 polkitd[1237]: Loading rules from directory /etc/polkit-1/rules.d Sep 6 01:24:49.903586 env[1193]: time="2025-09-06T01:24:49.901001737Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 01:24:49.903586 env[1193]: time="2025-09-06T01:24:49.901073157Z" level=info msg="Connect containerd service" Sep 6 01:24:49.903586 env[1193]: time="2025-09-06T01:24:49.901132394Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 01:24:49.901800 polkitd[1237]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 6 01:24:49.906471 polkitd[1237]: Finished loading, compiling and executing 2 rules Sep 6 01:24:49.907043 systemd[1]: Started polkit.service. Sep 6 01:24:49.906910 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 6 01:24:49.907737 polkitd[1237]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 6 01:24:49.912875 env[1193]: time="2025-09-06T01:24:49.912659915Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:24:49.913482 env[1193]: time="2025-09-06T01:24:49.913042711Z" level=info msg="Start subscribing containerd event" Sep 6 01:24:49.913482 env[1193]: time="2025-09-06T01:24:49.913128605Z" level=info msg="Start recovering state" Sep 6 01:24:49.913482 env[1193]: time="2025-09-06T01:24:49.913231419Z" level=info msg="Start event monitor" Sep 6 01:24:49.913482 env[1193]: time="2025-09-06T01:24:49.913267246Z" level=info msg="Start snapshots syncer" Sep 6 01:24:49.913482 env[1193]: time="2025-09-06T01:24:49.913283700Z" level=info msg="Start cni network conf syncer for default" Sep 6 01:24:49.913482 env[1193]: time="2025-09-06T01:24:49.913293086Z" level=info msg="Start streaming server" Sep 6 01:24:49.915775 env[1193]: time="2025-09-06T01:24:49.914798107Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 01:24:49.915775 env[1193]: time="2025-09-06T01:24:49.914854570Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 01:24:49.915775 env[1193]: time="2025-09-06T01:24:49.914918230Z" level=info msg="containerd successfully booted in 0.135386s" Sep 6 01:24:49.914977 systemd[1]: Started containerd.service. Sep 6 01:24:49.925020 systemd-hostnamed[1200]: Hostname set to (static) Sep 6 01:24:50.135266 locksmithd[1227]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 01:24:50.343024 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 01:24:50.376709 systemd[1]: Finished sshd-keygen.service. Sep 6 01:24:50.382804 systemd[1]: Starting issuegen.service... Sep 6 01:24:50.390224 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 01:24:50.390396 systemd[1]: Finished issuegen.service. Sep 6 01:24:50.392825 systemd[1]: Starting systemd-user-sessions.service... Sep 6 01:24:50.400735 systemd[1]: Finished systemd-user-sessions.service. Sep 6 01:24:50.402788 systemd[1]: Started getty@tty1.service. Sep 6 01:24:50.404850 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 01:24:50.405494 systemd[1]: Reached target getty.target. Sep 6 01:24:50.789710 systemd[1]: Started kubelet.service. Sep 6 01:24:51.209557 systemd-networkd[1031]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:17cb:24:19ff:fef4:5f2e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:17cb:24:19ff:fef4:5f2e/64 assigned by NDisc. Sep 6 01:24:51.209566 systemd-networkd[1031]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 01:24:51.438496 kubelet[1265]: E0906 01:24:51.438442 1265 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:24:51.442769 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:24:51.443182 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:24:51.443970 systemd[1]: kubelet.service: Consumed 1.224s CPU time. Sep 6 01:24:51.829462 systemd[1]: Created slice system-sshd.slice. Sep 6 01:24:51.838382 systemd[1]: Started sshd@0-10.244.95.46:22-139.178.89.65:56258.service. Sep 6 01:24:52.781782 sshd[1273]: Accepted publickey for core from 139.178.89.65 port 56258 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:24:52.786319 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:52.804002 systemd[1]: Created slice user-500.slice. Sep 6 01:24:52.806338 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 01:24:52.811785 systemd-logind[1185]: New session 1 of user core. Sep 6 01:24:52.826041 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 01:24:52.830820 systemd[1]: Starting user@500.service... Sep 6 01:24:52.835472 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:52.913289 systemd[1277]: Queued start job for default target default.target. Sep 6 01:24:52.913851 systemd[1277]: Reached target paths.target. Sep 6 01:24:52.913870 systemd[1277]: Reached target sockets.target. Sep 6 01:24:52.913883 systemd[1277]: Reached target timers.target. Sep 6 01:24:52.913894 systemd[1277]: Reached target basic.target. Sep 6 01:24:52.913932 systemd[1277]: Reached target default.target. Sep 6 01:24:52.913959 systemd[1277]: Startup finished in 69ms. Sep 6 01:24:52.915247 systemd[1]: Started user@500.service. Sep 6 01:24:52.920530 systemd[1]: Started session-1.scope. Sep 6 01:24:53.567152 systemd[1]: Started sshd@1-10.244.95.46:22-139.178.89.65:56274.service. Sep 6 01:24:54.481940 sshd[1286]: Accepted publickey for core from 139.178.89.65 port 56274 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:24:54.486170 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:54.497312 systemd-logind[1185]: New session 2 of user core. Sep 6 01:24:54.499685 systemd[1]: Started session-2.scope. Sep 6 01:24:55.122722 sshd[1286]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:55.130362 systemd[1]: sshd@1-10.244.95.46:22-139.178.89.65:56274.service: Deactivated successfully. Sep 6 01:24:55.131928 systemd[1]: session-2.scope: Deactivated successfully. Sep 6 01:24:55.132966 systemd-logind[1185]: Session 2 logged out. Waiting for processes to exit. Sep 6 01:24:55.134521 systemd-logind[1185]: Removed session 2. Sep 6 01:24:55.286457 systemd[1]: Started sshd@2-10.244.95.46:22-139.178.89.65:56276.service. Sep 6 01:24:56.263730 sshd[1292]: Accepted publickey for core from 139.178.89.65 port 56276 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:24:56.267277 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:56.277752 systemd[1]: Started session-3.scope. Sep 6 01:24:56.278731 systemd-logind[1185]: New session 3 of user core. Sep 6 01:24:56.704453 coreos-metadata[1176]: Sep 06 01:24:56.703 WARN failed to locate config-drive, using the metadata service API instead Sep 6 01:24:56.757426 coreos-metadata[1176]: Sep 06 01:24:56.757 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Sep 6 01:24:56.792083 coreos-metadata[1176]: Sep 06 01:24:56.792 INFO Fetch successful Sep 6 01:24:56.792261 coreos-metadata[1176]: Sep 06 01:24:56.792 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 6 01:24:56.833650 coreos-metadata[1176]: Sep 06 01:24:56.833 INFO Fetch successful Sep 6 01:24:56.835442 unknown[1176]: wrote ssh authorized keys file for user: core Sep 6 01:24:56.847049 update-ssh-keys[1298]: Updated "/home/core/.ssh/authorized_keys" Sep 6 01:24:56.847997 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 6 01:24:56.848642 systemd[1]: Reached target multi-user.target. Sep 6 01:24:56.851665 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 01:24:56.860409 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 01:24:56.860709 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 01:24:56.865184 systemd[1]: Startup finished in 905ms (kernel) + 6.045s (initrd) + 12.153s (userspace) = 19.105s. Sep 6 01:24:56.941924 sshd[1292]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:56.946643 systemd[1]: sshd@2-10.244.95.46:22-139.178.89.65:56276.service: Deactivated successfully. Sep 6 01:24:56.947555 systemd[1]: session-3.scope: Deactivated successfully. Sep 6 01:24:56.948610 systemd-logind[1185]: Session 3 logged out. Waiting for processes to exit. Sep 6 01:24:56.950853 systemd-logind[1185]: Removed session 3. Sep 6 01:25:01.695440 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 01:25:01.695912 systemd[1]: Stopped kubelet.service. Sep 6 01:25:01.696012 systemd[1]: kubelet.service: Consumed 1.224s CPU time. Sep 6 01:25:01.699558 systemd[1]: Starting kubelet.service... Sep 6 01:25:01.843879 systemd[1]: Started kubelet.service. Sep 6 01:25:01.888647 kubelet[1305]: E0906 01:25:01.888605 1305 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:25:01.893385 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:25:01.893576 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:25:07.164776 systemd[1]: Started sshd@3-10.244.95.46:22-139.178.89.65:55632.service. Sep 6 01:25:08.073344 sshd[1311]: Accepted publickey for core from 139.178.89.65 port 55632 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:08.077210 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:08.089104 systemd-logind[1185]: New session 4 of user core. Sep 6 01:25:08.090012 systemd[1]: Started session-4.scope. Sep 6 01:25:08.707265 sshd[1311]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:08.715355 systemd[1]: sshd@3-10.244.95.46:22-139.178.89.65:55632.service: Deactivated successfully. Sep 6 01:25:08.716846 systemd-logind[1185]: Session 4 logged out. Waiting for processes to exit. Sep 6 01:25:08.716981 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 01:25:08.719562 systemd-logind[1185]: Removed session 4. Sep 6 01:25:08.879751 systemd[1]: Started sshd@4-10.244.95.46:22-139.178.89.65:55644.service. Sep 6 01:25:09.840579 sshd[1317]: Accepted publickey for core from 139.178.89.65 port 55644 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:09.844937 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:09.855867 systemd[1]: Started session-5.scope. Sep 6 01:25:09.856358 systemd-logind[1185]: New session 5 of user core. Sep 6 01:25:10.502463 sshd[1317]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:10.510484 systemd[1]: sshd@4-10.244.95.46:22-139.178.89.65:55644.service: Deactivated successfully. Sep 6 01:25:10.511051 systemd-logind[1185]: Session 5 logged out. Waiting for processes to exit. Sep 6 01:25:10.512015 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 01:25:10.514522 systemd-logind[1185]: Removed session 5. Sep 6 01:25:10.644412 systemd[1]: Started sshd@5-10.244.95.46:22-139.178.89.65:52836.service. Sep 6 01:25:11.555423 sshd[1323]: Accepted publickey for core from 139.178.89.65 port 52836 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:11.559890 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:11.569522 systemd-logind[1185]: New session 6 of user core. Sep 6 01:25:11.572172 systemd[1]: Started session-6.scope. Sep 6 01:25:12.044488 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 01:25:12.044667 systemd[1]: Stopped kubelet.service. Sep 6 01:25:12.046491 systemd[1]: Starting kubelet.service... Sep 6 01:25:12.175440 systemd[1]: Started kubelet.service. Sep 6 01:25:12.190892 sshd[1323]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:12.194548 systemd[1]: sshd@5-10.244.95.46:22-139.178.89.65:52836.service: Deactivated successfully. Sep 6 01:25:12.195316 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 01:25:12.196747 systemd-logind[1185]: Session 6 logged out. Waiting for processes to exit. Sep 6 01:25:12.197799 systemd-logind[1185]: Removed session 6. Sep 6 01:25:12.221105 kubelet[1331]: E0906 01:25:12.221049 1331 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:25:12.223069 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:25:12.223215 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:25:12.345105 systemd[1]: Started sshd@6-10.244.95.46:22-139.178.89.65:52846.service. Sep 6 01:25:13.260914 sshd[1339]: Accepted publickey for core from 139.178.89.65 port 52846 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:13.265434 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:13.272951 systemd-logind[1185]: New session 7 of user core. Sep 6 01:25:13.275735 systemd[1]: Started session-7.scope. Sep 6 01:25:13.761553 sudo[1342]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 01:25:13.761810 sudo[1342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:25:13.773891 dbus-daemon[1177]: \xd0}\xe5QmU: received setenforce notice (enforcing=-1443587232) Sep 6 01:25:13.775494 sudo[1342]: pam_unix(sudo:session): session closed for user root Sep 6 01:25:13.925375 sshd[1339]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:13.933033 systemd[1]: sshd@6-10.244.95.46:22-139.178.89.65:52846.service: Deactivated successfully. Sep 6 01:25:13.934878 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 01:25:13.936521 systemd-logind[1185]: Session 7 logged out. Waiting for processes to exit. Sep 6 01:25:13.938861 systemd-logind[1185]: Removed session 7. Sep 6 01:25:14.075967 systemd[1]: Started sshd@7-10.244.95.46:22-139.178.89.65:52852.service. Sep 6 01:25:14.984958 sshd[1346]: Accepted publickey for core from 139.178.89.65 port 52852 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:14.988859 sshd[1346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:14.999905 systemd-logind[1185]: New session 8 of user core. Sep 6 01:25:15.000875 systemd[1]: Started session-8.scope. Sep 6 01:25:15.473691 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 01:25:15.475173 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:25:15.481231 sudo[1350]: pam_unix(sudo:session): session closed for user root Sep 6 01:25:15.489554 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 01:25:15.489809 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:25:15.503154 systemd[1]: Stopping audit-rules.service... Sep 6 01:25:15.502000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:25:15.504827 kernel: kauditd_printk_skb: 22 callbacks suppressed Sep 6 01:25:15.504911 kernel: audit: type=1305 audit(1757121915.502:223): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:25:15.505306 auditctl[1353]: No rules Sep 6 01:25:15.506884 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 01:25:15.507070 systemd[1]: Stopped audit-rules.service. Sep 6 01:25:15.502000 audit[1353]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc44794220 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.508892 systemd[1]: Starting audit-rules.service... Sep 6 01:25:15.514519 kernel: audit: type=1300 audit(1757121915.502:223): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc44794220 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.514594 kernel: audit: type=1327 audit(1757121915.502:223): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:25:15.502000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:25:15.517905 kernel: audit: type=1131 audit(1757121915.506:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.541130 augenrules[1370]: No rules Sep 6 01:25:15.542153 systemd[1]: Finished audit-rules.service. Sep 6 01:25:15.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.543842 sudo[1349]: pam_unix(sudo:session): session closed for user root Sep 6 01:25:15.546293 kernel: audit: type=1130 audit(1757121915.542:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.546387 kernel: audit: type=1106 audit(1757121915.543:226): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.543000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.543000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.552682 kernel: audit: type=1104 audit(1757121915.543:227): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.692700 sshd[1346]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:15.693000 audit[1346]: USER_END pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:15.698510 systemd-logind[1185]: Session 8 logged out. Waiting for processes to exit. Sep 6 01:25:15.700034 systemd[1]: sshd@7-10.244.95.46:22-139.178.89.65:52852.service: Deactivated successfully. Sep 6 01:25:15.700860 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 01:25:15.693000 audit[1346]: CRED_DISP pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:15.702326 systemd-logind[1185]: Removed session 8. Sep 6 01:25:15.705301 kernel: audit: type=1106 audit(1757121915.693:228): pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:15.705385 kernel: audit: type=1104 audit(1757121915.693:229): pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:15.705430 kernel: audit: type=1131 audit(1757121915.698:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.95.46:22-139.178.89.65:52852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.95.46:22-139.178.89.65:52852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.46:22-139.178.89.65:52866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:15.842187 systemd[1]: Started sshd@8-10.244.95.46:22-139.178.89.65:52866.service. Sep 6 01:25:16.740000 audit[1376]: USER_ACCT pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:16.741766 sshd[1376]: Accepted publickey for core from 139.178.89.65 port 52866 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:16.742000 audit[1376]: CRED_ACQ pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:16.742000 audit[1376]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe439ea9b0 a2=3 a3=0 items=0 ppid=1 pid=1376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:16.742000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:16.745652 sshd[1376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:16.755252 systemd-logind[1185]: New session 9 of user core. Sep 6 01:25:16.755528 systemd[1]: Started session-9.scope. Sep 6 01:25:16.762000 audit[1376]: USER_START pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:16.764000 audit[1378]: CRED_ACQ pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:17.223000 audit[1379]: USER_ACCT pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:17.225230 sudo[1379]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 01:25:17.224000 audit[1379]: CRED_REFR pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:17.226062 sudo[1379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:25:17.228000 audit[1379]: USER_START pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:17.246235 systemd[1]: Starting coreos-metadata.service... Sep 6 01:25:21.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:21.250042 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 6 01:25:21.263574 kernel: kauditd_printk_skb: 11 callbacks suppressed Sep 6 01:25:21.263688 kernel: audit: type=1131 audit(1757121921.249:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:21.272000 audit: BPF prog-id=46 op=UNLOAD Sep 6 01:25:21.272000 audit: BPF prog-id=45 op=UNLOAD Sep 6 01:25:21.275292 kernel: audit: type=1334 audit(1757121921.272:241): prog-id=46 op=UNLOAD Sep 6 01:25:21.275341 kernel: audit: type=1334 audit(1757121921.272:242): prog-id=45 op=UNLOAD Sep 6 01:25:21.275366 kernel: audit: type=1334 audit(1757121921.272:243): prog-id=44 op=UNLOAD Sep 6 01:25:21.272000 audit: BPF prog-id=44 op=UNLOAD Sep 6 01:25:22.369913 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 01:25:22.370578 systemd[1]: Stopped kubelet.service. Sep 6 01:25:22.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:22.374039 systemd[1]: Starting kubelet.service... Sep 6 01:25:22.378001 kernel: audit: type=1130 audit(1757121922.370:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:22.378068 kernel: audit: type=1131 audit(1757121922.370:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:22.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:22.510154 systemd[1]: Started kubelet.service. Sep 6 01:25:22.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:22.514152 kernel: audit: type=1130 audit(1757121922.509:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:22.563295 kubelet[1394]: E0906 01:25:22.563179 1394 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:25:22.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:25:22.566212 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:25:22.566442 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:25:22.573137 kernel: audit: type=1131 audit(1757121922.565:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:25:24.312646 coreos-metadata[1383]: Sep 06 01:25:24.312 WARN failed to locate config-drive, using the metadata service API instead Sep 6 01:25:24.365347 coreos-metadata[1383]: Sep 06 01:25:24.365 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Sep 6 01:25:24.366645 coreos-metadata[1383]: Sep 06 01:25:24.366 INFO Fetch successful Sep 6 01:25:24.366922 coreos-metadata[1383]: Sep 06 01:25:24.366 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Sep 6 01:25:24.381163 coreos-metadata[1383]: Sep 06 01:25:24.380 INFO Fetch successful Sep 6 01:25:24.381524 coreos-metadata[1383]: Sep 06 01:25:24.381 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Sep 6 01:25:24.399824 coreos-metadata[1383]: Sep 06 01:25:24.399 INFO Fetch successful Sep 6 01:25:24.400073 coreos-metadata[1383]: Sep 06 01:25:24.399 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Sep 6 01:25:24.414335 coreos-metadata[1383]: Sep 06 01:25:24.413 INFO Fetch successful Sep 6 01:25:24.414829 coreos-metadata[1383]: Sep 06 01:25:24.414 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Sep 6 01:25:24.434258 coreos-metadata[1383]: Sep 06 01:25:24.433 INFO Fetch successful Sep 6 01:25:24.451784 systemd[1]: Finished coreos-metadata.service. Sep 6 01:25:24.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:24.462192 kernel: audit: type=1130 audit(1757121924.452:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:25.155320 kernel: audit: type=1130 audit(1757121925.148:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:25.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:25.149802 systemd[1]: Stopped kubelet.service. Sep 6 01:25:25.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:25.158509 systemd[1]: Starting kubelet.service... Sep 6 01:25:25.189327 systemd[1]: Reloading. Sep 6 01:25:25.303477 /usr/lib/systemd/system-generators/torcx-generator[1451]: time="2025-09-06T01:25:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:25:25.303883 /usr/lib/systemd/system-generators/torcx-generator[1451]: time="2025-09-06T01:25:25Z" level=info msg="torcx already run" Sep 6 01:25:25.397827 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:25:25.398063 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:25:25.417607 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit: BPF prog-id=49 op=LOAD Sep 6 01:25:25.492000 audit: BPF prog-id=30 op=UNLOAD Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit: BPF prog-id=50 op=LOAD Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.493000 audit: BPF prog-id=51 op=LOAD Sep 6 01:25:25.493000 audit: BPF prog-id=31 op=UNLOAD Sep 6 01:25:25.493000 audit: BPF prog-id=32 op=UNLOAD Sep 6 01:25:25.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.495000 audit: BPF prog-id=52 op=LOAD Sep 6 01:25:25.495000 audit: BPF prog-id=40 op=UNLOAD Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit: BPF prog-id=53 op=LOAD Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.499000 audit: BPF prog-id=54 op=LOAD Sep 6 01:25:25.499000 audit: BPF prog-id=33 op=UNLOAD Sep 6 01:25:25.499000 audit: BPF prog-id=34 op=UNLOAD Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.501000 audit: BPF prog-id=55 op=LOAD Sep 6 01:25:25.502000 audit: BPF prog-id=39 op=UNLOAD Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.502000 audit: BPF prog-id=56 op=LOAD Sep 6 01:25:25.502000 audit: BPF prog-id=47 op=UNLOAD Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit: BPF prog-id=57 op=LOAD Sep 6 01:25:25.504000 audit: BPF prog-id=35 op=UNLOAD Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit: BPF prog-id=58 op=LOAD Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.505000 audit: BPF prog-id=59 op=LOAD Sep 6 01:25:25.505000 audit: BPF prog-id=36 op=UNLOAD Sep 6 01:25:25.505000 audit: BPF prog-id=37 op=UNLOAD Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit: BPF prog-id=60 op=LOAD Sep 6 01:25:25.507000 audit: BPF prog-id=41 op=UNLOAD Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit: BPF prog-id=61 op=LOAD Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.507000 audit: BPF prog-id=62 op=LOAD Sep 6 01:25:25.507000 audit: BPF prog-id=42 op=UNLOAD Sep 6 01:25:25.507000 audit: BPF prog-id=43 op=UNLOAD Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:25.508000 audit: BPF prog-id=63 op=LOAD Sep 6 01:25:25.508000 audit: BPF prog-id=38 op=UNLOAD Sep 6 01:25:25.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:25.527417 systemd[1]: Started kubelet.service. Sep 6 01:25:25.529251 systemd[1]: Stopping kubelet.service... Sep 6 01:25:25.529527 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 01:25:25.530048 systemd[1]: Stopped kubelet.service. Sep 6 01:25:25.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:25.531859 systemd[1]: Starting kubelet.service... Sep 6 01:25:25.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:25.642512 systemd[1]: Started kubelet.service. Sep 6 01:25:25.699709 kubelet[1505]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:25:25.703230 kubelet[1505]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 6 01:25:25.703230 kubelet[1505]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:25:25.703453 kubelet[1505]: I0906 01:25:25.703347 1505 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 01:25:25.972065 kubelet[1505]: I0906 01:25:25.971936 1505 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 6 01:25:25.972294 kubelet[1505]: I0906 01:25:25.972275 1505 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 01:25:25.973097 kubelet[1505]: I0906 01:25:25.973072 1505 server.go:934] "Client rotation is on, will bootstrap in background" Sep 6 01:25:26.006838 kubelet[1505]: I0906 01:25:26.006782 1505 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 01:25:26.017255 kubelet[1505]: E0906 01:25:26.017059 1505 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 01:25:26.017255 kubelet[1505]: I0906 01:25:26.017124 1505 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 01:25:26.021974 kubelet[1505]: I0906 01:25:26.021941 1505 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 01:25:26.022160 kubelet[1505]: I0906 01:25:26.022067 1505 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 6 01:25:26.022274 kubelet[1505]: I0906 01:25:26.022205 1505 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 01:25:26.022441 kubelet[1505]: I0906 01:25:26.022240 1505 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.244.95.46","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 01:25:26.022853 kubelet[1505]: I0906 01:25:26.022459 1505 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 01:25:26.022853 kubelet[1505]: I0906 01:25:26.022470 1505 container_manager_linux.go:300] "Creating device plugin manager" Sep 6 01:25:26.022853 kubelet[1505]: I0906 01:25:26.022621 1505 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:25:26.027765 kubelet[1505]: I0906 01:25:26.027705 1505 kubelet.go:408] "Attempting to sync node with API server" Sep 6 01:25:26.027765 kubelet[1505]: I0906 01:25:26.027747 1505 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 01:25:26.027765 kubelet[1505]: I0906 01:25:26.027785 1505 kubelet.go:314] "Adding apiserver pod source" Sep 6 01:25:26.028241 kubelet[1505]: I0906 01:25:26.027808 1505 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 01:25:26.035778 kubelet[1505]: E0906 01:25:26.035732 1505 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:26.035941 kubelet[1505]: E0906 01:25:26.035793 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:26.038456 kubelet[1505]: I0906 01:25:26.038409 1505 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 01:25:26.039237 kubelet[1505]: I0906 01:25:26.039220 1505 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 6 01:25:26.039430 kubelet[1505]: W0906 01:25:26.039415 1505 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 01:25:26.043135 kubelet[1505]: I0906 01:25:26.043095 1505 server.go:1274] "Started kubelet" Sep 6 01:25:26.044694 kubelet[1505]: I0906 01:25:26.044669 1505 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 01:25:26.043000 audit[1505]: AVC avc: denied { mac_admin } for pid=1505 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:26.043000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:25:26.043000 audit[1505]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009172f0 a1=c0009706a8 a2=c0009172c0 a3=25 items=0 ppid=1 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:25:26.043000 audit[1505]: AVC avc: denied { mac_admin } for pid=1505 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:26.043000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:25:26.043000 audit[1505]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000914ae0 a1=c0009706c0 a2=c000917380 a3=25 items=0 ppid=1 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:25:26.045337 kubelet[1505]: I0906 01:25:26.045318 1505 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 6 01:25:26.045509 kubelet[1505]: I0906 01:25:26.045486 1505 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 01:25:26.056192 kubelet[1505]: I0906 01:25:26.056047 1505 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 01:25:26.057154 kubelet[1505]: I0906 01:25:26.057088 1505 server.go:449] "Adding debug handlers to kubelet server" Sep 6 01:25:26.059543 kubelet[1505]: I0906 01:25:26.059519 1505 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 6 01:25:26.061742 kubelet[1505]: E0906 01:25:26.061717 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.062628 kubelet[1505]: I0906 01:25:26.062608 1505 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 6 01:25:26.062965 kubelet[1505]: I0906 01:25:26.062953 1505 reconciler.go:26] "Reconciler: start to sync state" Sep 6 01:25:26.066762 kubelet[1505]: W0906 01:25:26.066736 1505 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 6 01:25:26.069803 kubelet[1505]: E0906 01:25:26.069779 1505 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 6 01:25:26.069909 kubelet[1505]: W0906 01:25:26.069734 1505 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.244.95.46" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 6 01:25:26.070003 kubelet[1505]: E0906 01:25:26.069983 1505 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.244.95.46\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 6 01:25:26.070059 kubelet[1505]: E0906 01:25:26.067170 1505 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.95.46.18628d1504d8ac79 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.95.46,UID:10.244.95.46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.244.95.46,},FirstTimestamp:2025-09-06 01:25:26.043053177 +0000 UTC m=+0.392461473,LastTimestamp:2025-09-06 01:25:26.043053177 +0000 UTC m=+0.392461473,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.95.46,}" Sep 6 01:25:26.074867 kubelet[1505]: I0906 01:25:26.074844 1505 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 01:25:26.075103 kubelet[1505]: I0906 01:25:26.075083 1505 factory.go:221] Registration of the systemd container factory successfully Sep 6 01:25:26.075219 kubelet[1505]: I0906 01:25:26.075092 1505 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 01:25:26.075619 kubelet[1505]: I0906 01:25:26.075605 1505 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 01:25:26.075784 kubelet[1505]: I0906 01:25:26.075200 1505 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 01:25:26.076071 kubelet[1505]: E0906 01:25:26.076050 1505 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 01:25:26.079324 kubelet[1505]: I0906 01:25:26.079306 1505 factory.go:221] Registration of the containerd container factory successfully Sep 6 01:25:26.090117 kubelet[1505]: E0906 01:25:26.090075 1505 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.244.95.46\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 6 01:25:26.090231 kubelet[1505]: E0906 01:25:26.090138 1505 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.95.46.18628d1506cffd6c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.95.46,UID:10.244.95.46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.244.95.46,},FirstTimestamp:2025-09-06 01:25:26.076038508 +0000 UTC m=+0.425446826,LastTimestamp:2025-09-06 01:25:26.076038508 +0000 UTC m=+0.425446826,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.95.46,}" Sep 6 01:25:26.090319 kubelet[1505]: W0906 01:25:26.090283 1505 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Sep 6 01:25:26.090319 kubelet[1505]: E0906 01:25:26.090308 1505 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 6 01:25:26.092500 kubelet[1505]: I0906 01:25:26.092480 1505 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 6 01:25:26.093251 kubelet[1505]: I0906 01:25:26.093236 1505 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 6 01:25:26.093429 kubelet[1505]: I0906 01:25:26.093407 1505 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:25:26.103918 kubelet[1505]: E0906 01:25:26.103420 1505 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.95.46.18628d1507ab67ef default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.95.46,UID:10.244.95.46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.244.95.46 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.244.95.46,},FirstTimestamp:2025-09-06 01:25:26.090418159 +0000 UTC m=+0.439826454,LastTimestamp:2025-09-06 01:25:26.090418159 +0000 UTC m=+0.439826454,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.95.46,}" Sep 6 01:25:26.105346 kubelet[1505]: I0906 01:25:26.105325 1505 policy_none.go:49] "None policy: Start" Sep 6 01:25:26.107940 kubelet[1505]: I0906 01:25:26.107898 1505 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 6 01:25:26.108039 kubelet[1505]: I0906 01:25:26.107997 1505 state_mem.go:35] "Initializing new in-memory state store" Sep 6 01:25:26.109000 audit[1519]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1519 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.109000 audit[1519]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4b5ed970 a2=0 a3=7ffd4b5ed95c items=0 ppid=1505 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:25:26.112823 kubelet[1505]: E0906 01:25:26.112497 1505 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.95.46.18628d1507ab799c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.95.46,UID:10.244.95.46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.244.95.46 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.244.95.46,},FirstTimestamp:2025-09-06 01:25:26.090422684 +0000 UTC m=+0.439830994,LastTimestamp:2025-09-06 01:25:26.090422684 +0000 UTC m=+0.439830994,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.95.46,}" Sep 6 01:25:26.115000 audit[1525]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1525 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.115000 audit[1525]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffce21a25b0 a2=0 a3=7ffce21a259c items=0 ppid=1505 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:25:26.118442 systemd[1]: Created slice kubepods.slice. Sep 6 01:25:26.123501 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 01:25:26.125928 kubelet[1505]: E0906 01:25:26.125855 1505 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.95.46.18628d1507ab8703 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.95.46,UID:10.244.95.46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.244.95.46 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.244.95.46,},FirstTimestamp:2025-09-06 01:25:26.090426115 +0000 UTC m=+0.439834424,LastTimestamp:2025-09-06 01:25:26.090426115 +0000 UTC m=+0.439834424,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.95.46,}" Sep 6 01:25:26.126543 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 01:25:26.133340 kubelet[1505]: I0906 01:25:26.133308 1505 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 6 01:25:26.133544 kubelet[1505]: I0906 01:25:26.133523 1505 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 6 01:25:26.133759 kubelet[1505]: I0906 01:25:26.133749 1505 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 01:25:26.133902 kubelet[1505]: I0906 01:25:26.133856 1505 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 01:25:26.132000 audit[1505]: AVC avc: denied { mac_admin } for pid=1505 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:26.132000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:25:26.132000 audit[1505]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b17e00 a1=c000ce1578 a2=c000b17dd0 a3=25 items=0 ppid=1 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.132000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:25:26.136452 kubelet[1505]: I0906 01:25:26.136437 1505 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 01:25:26.137954 kubelet[1505]: E0906 01:25:26.137925 1505 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.244.95.46\" not found" Sep 6 01:25:26.123000 audit[1527]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.123000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffce0a7ee80 a2=0 a3=7ffce0a7ee6c items=0 ppid=1505 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:25:26.147087 kubelet[1505]: E0906 01:25:26.146895 1505 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.95.46.18628d150a7cc9b2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.95.46,UID:10.244.95.46,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.244.95.46,},FirstTimestamp:2025-09-06 01:25:26.137694642 +0000 UTC m=+0.487102939,LastTimestamp:2025-09-06 01:25:26.137694642 +0000 UTC m=+0.487102939,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.95.46,}" Sep 6 01:25:26.150000 audit[1532]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.150000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc54e83f00 a2=0 a3=7ffc54e83eec items=0 ppid=1505 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:25:26.214000 audit[1537]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.214000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdc87a75e0 a2=0 a3=7ffdc87a75cc items=0 ppid=1505 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 01:25:26.216990 kubelet[1505]: I0906 01:25:26.216826 1505 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 6 01:25:26.217000 audit[1538]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.217000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb91e75d0 a2=0 a3=7ffeb91e75bc items=0 ppid=1505 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:25:26.218000 audit[1540]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.218000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff17a81ca0 a2=0 a3=7fff17a81c8c items=0 ppid=1505 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:25:26.220000 audit[1541]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:26.220000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff12bfb5e0 a2=0 a3=7fff12bfb5cc items=0 ppid=1505 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:25:26.220000 audit[1539]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:26.220000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf9b2d350 a2=0 a3=7ffdf9b2d33c items=0 ppid=1505 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:25:26.221943 kubelet[1505]: I0906 01:25:26.221908 1505 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 6 01:25:26.222004 kubelet[1505]: I0906 01:25:26.221985 1505 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 6 01:25:26.222040 kubelet[1505]: I0906 01:25:26.222017 1505 kubelet.go:2321] "Starting kubelet main sync loop" Sep 6 01:25:26.224685 kubelet[1505]: E0906 01:25:26.222193 1505 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 6 01:25:26.225000 audit[1542]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:26.225000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2b8451d0 a2=0 a3=7ffe2b8451bc items=0 ppid=1505 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:25:26.226000 audit[1543]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1543 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:26.226000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff8825f9c0 a2=0 a3=7fff8825f9ac items=0 ppid=1505 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:25:26.227000 audit[1544]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:26.227000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5feca550 a2=0 a3=7ffd5feca53c items=0 ppid=1505 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:25:26.235198 kubelet[1505]: I0906 01:25:26.235151 1505 kubelet_node_status.go:72] "Attempting to register node" node="10.244.95.46" Sep 6 01:25:26.247929 kubelet[1505]: I0906 01:25:26.247869 1505 kubelet_node_status.go:75] "Successfully registered node" node="10.244.95.46" Sep 6 01:25:26.248307 kubelet[1505]: E0906 01:25:26.248272 1505 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.244.95.46\": node \"10.244.95.46\" not found" Sep 6 01:25:26.259566 kubelet[1505]: E0906 01:25:26.259486 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.360204 kubelet[1505]: E0906 01:25:26.360080 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.461023 kubelet[1505]: E0906 01:25:26.460946 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.562704 kubelet[1505]: E0906 01:25:26.561722 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.661980 kubelet[1505]: E0906 01:25:26.661894 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.762759 kubelet[1505]: E0906 01:25:26.762704 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.863644 kubelet[1505]: E0906 01:25:26.863422 1505 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.95.46\" not found" Sep 6 01:25:26.964835 kubelet[1505]: I0906 01:25:26.964810 1505 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 6 01:25:26.965441 env[1193]: time="2025-09-06T01:25:26.965373819Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 01:25:26.966039 kubelet[1505]: I0906 01:25:26.966025 1505 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 6 01:25:26.976908 kubelet[1505]: I0906 01:25:26.976856 1505 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 6 01:25:26.977183 kubelet[1505]: W0906 01:25:26.977163 1505 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 01:25:26.977287 kubelet[1505]: W0906 01:25:26.977184 1505 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 01:25:26.977367 kubelet[1505]: W0906 01:25:26.977223 1505 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 6 01:25:27.036528 kubelet[1505]: I0906 01:25:27.036456 1505 apiserver.go:52] "Watching apiserver" Sep 6 01:25:27.037241 kubelet[1505]: E0906 01:25:27.036552 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:27.055379 kubelet[1505]: E0906 01:25:27.055099 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:27.064188 kubelet[1505]: I0906 01:25:27.063688 1505 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 6 01:25:27.063886 systemd[1]: Created slice kubepods-besteffort-podb4ac34fb_14af_4d55_b965_66418e9bc4c9.slice. Sep 6 01:25:27.080010 kubelet[1505]: I0906 01:25:27.079970 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-node-certs\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080010 kubelet[1505]: I0906 01:25:27.080010 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-xtables-lock\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080224 kubelet[1505]: I0906 01:25:27.080029 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8a839322-0603-41eb-96b8-e1331153712c-kubelet-dir\") pod \"csi-node-driver-bqtnz\" (UID: \"8a839322-0603-41eb-96b8-e1331153712c\") " pod="calico-system/csi-node-driver-bqtnz" Sep 6 01:25:27.080224 kubelet[1505]: I0906 01:25:27.080046 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8a839322-0603-41eb-96b8-e1331153712c-registration-dir\") pod \"csi-node-driver-bqtnz\" (UID: \"8a839322-0603-41eb-96b8-e1331153712c\") " pod="calico-system/csi-node-driver-bqtnz" Sep 6 01:25:27.080224 kubelet[1505]: I0906 01:25:27.080065 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b4ac34fb-14af-4d55-b965-66418e9bc4c9-xtables-lock\") pod \"kube-proxy-6jbhl\" (UID: \"b4ac34fb-14af-4d55-b965-66418e9bc4c9\") " pod="kube-system/kube-proxy-6jbhl" Sep 6 01:25:27.080224 kubelet[1505]: I0906 01:25:27.080081 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b4ac34fb-14af-4d55-b965-66418e9bc4c9-lib-modules\") pod \"kube-proxy-6jbhl\" (UID: \"b4ac34fb-14af-4d55-b965-66418e9bc4c9\") " pod="kube-system/kube-proxy-6jbhl" Sep 6 01:25:27.080224 kubelet[1505]: I0906 01:25:27.080096 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-lib-modules\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080374 kubelet[1505]: I0906 01:25:27.080126 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b4ac34fb-14af-4d55-b965-66418e9bc4c9-kube-proxy\") pod \"kube-proxy-6jbhl\" (UID: \"b4ac34fb-14af-4d55-b965-66418e9bc4c9\") " pod="kube-system/kube-proxy-6jbhl" Sep 6 01:25:27.080374 kubelet[1505]: I0906 01:25:27.080143 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pvwb2\" (UniqueName: \"kubernetes.io/projected/b4ac34fb-14af-4d55-b965-66418e9bc4c9-kube-api-access-pvwb2\") pod \"kube-proxy-6jbhl\" (UID: \"b4ac34fb-14af-4d55-b965-66418e9bc4c9\") " pod="kube-system/kube-proxy-6jbhl" Sep 6 01:25:27.080374 kubelet[1505]: I0906 01:25:27.080160 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-cni-bin-dir\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080374 kubelet[1505]: I0906 01:25:27.080176 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-flexvol-driver-host\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080374 kubelet[1505]: I0906 01:25:27.080190 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-tigera-ca-bundle\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080529 kubelet[1505]: I0906 01:25:27.080206 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8a839322-0603-41eb-96b8-e1331153712c-varrun\") pod \"csi-node-driver-bqtnz\" (UID: \"8a839322-0603-41eb-96b8-e1331153712c\") " pod="calico-system/csi-node-driver-bqtnz" Sep 6 01:25:27.080529 kubelet[1505]: I0906 01:25:27.080221 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-var-lib-calico\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080529 kubelet[1505]: I0906 01:25:27.080237 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kjd4x\" (UniqueName: \"kubernetes.io/projected/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-kube-api-access-kjd4x\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080529 kubelet[1505]: I0906 01:25:27.080252 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-var-run-calico\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080529 kubelet[1505]: I0906 01:25:27.080268 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8a839322-0603-41eb-96b8-e1331153712c-socket-dir\") pod \"csi-node-driver-bqtnz\" (UID: \"8a839322-0603-41eb-96b8-e1331153712c\") " pod="calico-system/csi-node-driver-bqtnz" Sep 6 01:25:27.080675 kubelet[1505]: I0906 01:25:27.080285 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v45d6\" (UniqueName: \"kubernetes.io/projected/8a839322-0603-41eb-96b8-e1331153712c-kube-api-access-v45d6\") pod \"csi-node-driver-bqtnz\" (UID: \"8a839322-0603-41eb-96b8-e1331153712c\") " pod="calico-system/csi-node-driver-bqtnz" Sep 6 01:25:27.080675 kubelet[1505]: I0906 01:25:27.080300 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-cni-log-dir\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080675 kubelet[1505]: I0906 01:25:27.080315 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-cni-net-dir\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.080675 kubelet[1505]: I0906 01:25:27.080331 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b98d6291-edba-4bc3-b5e2-817d3bbfdb76-policysync\") pod \"calico-node-cnrhf\" (UID: \"b98d6291-edba-4bc3-b5e2-817d3bbfdb76\") " pod="calico-system/calico-node-cnrhf" Sep 6 01:25:27.085510 systemd[1]: Created slice kubepods-besteffort-podb98d6291_edba_4bc3_b5e2_817d3bbfdb76.slice. Sep 6 01:25:27.182950 kubelet[1505]: I0906 01:25:27.182884 1505 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 01:25:27.190217 kernel: kauditd_printk_skb: 224 callbacks suppressed Sep 6 01:25:27.190395 kernel: audit: type=1106 audit(1757121927.185:441): pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:27.185000 audit[1379]: USER_END pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:27.186673 sudo[1379]: pam_unix(sudo:session): session closed for user root Sep 6 01:25:27.190862 kubelet[1505]: E0906 01:25:27.186762 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.185000 audit[1379]: CRED_DISP pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:27.197495 kernel: audit: type=1104 audit(1757121927.185:442): pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:25:27.197622 kubelet[1505]: W0906 01:25:27.186777 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.198055 kubelet[1505]: E0906 01:25:27.197755 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.200354 kubelet[1505]: E0906 01:25:27.200324 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.200473 kubelet[1505]: W0906 01:25:27.200456 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.200591 kubelet[1505]: E0906 01:25:27.200579 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.200783 kubelet[1505]: E0906 01:25:27.200769 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.200836 kubelet[1505]: W0906 01:25:27.200784 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.200836 kubelet[1505]: E0906 01:25:27.200802 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.200984 kubelet[1505]: E0906 01:25:27.200969 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.200984 kubelet[1505]: W0906 01:25:27.200979 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.201107 kubelet[1505]: E0906 01:25:27.201095 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.201216 kubelet[1505]: E0906 01:25:27.201129 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.201296 kubelet[1505]: W0906 01:25:27.201284 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.201386 kubelet[1505]: E0906 01:25:27.201369 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.201609 kubelet[1505]: E0906 01:25:27.201598 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.201681 kubelet[1505]: W0906 01:25:27.201670 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.201770 kubelet[1505]: E0906 01:25:27.201757 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.201968 kubelet[1505]: E0906 01:25:27.201952 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.202046 kubelet[1505]: W0906 01:25:27.202035 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.202153 kubelet[1505]: E0906 01:25:27.202142 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.202348 kubelet[1505]: E0906 01:25:27.202329 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.202348 kubelet[1505]: W0906 01:25:27.202343 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.202441 kubelet[1505]: E0906 01:25:27.202358 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.202977 kubelet[1505]: E0906 01:25:27.202962 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.203039 kubelet[1505]: W0906 01:25:27.202976 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.203039 kubelet[1505]: E0906 01:25:27.202989 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.203211 kubelet[1505]: E0906 01:25:27.203199 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.203259 kubelet[1505]: W0906 01:25:27.203213 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.203259 kubelet[1505]: E0906 01:25:27.203224 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.213487 kubelet[1505]: E0906 01:25:27.213464 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.213487 kubelet[1505]: W0906 01:25:27.213482 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.213642 kubelet[1505]: E0906 01:25:27.213498 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.214051 kubelet[1505]: E0906 01:25:27.214037 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.214101 kubelet[1505]: W0906 01:25:27.214050 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.214101 kubelet[1505]: E0906 01:25:27.214063 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.220091 kubelet[1505]: E0906 01:25:27.220072 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:27.220255 kubelet[1505]: W0906 01:25:27.220240 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:27.220341 kubelet[1505]: E0906 01:25:27.220329 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:27.334525 sshd[1376]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:27.336000 audit[1376]: USER_END pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:27.348167 kernel: audit: type=1106 audit(1757121927.336:443): pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:27.348438 systemd[1]: sshd@8-10.244.95.46:22-139.178.89.65:52866.service: Deactivated successfully. Sep 6 01:25:27.337000 audit[1376]: CRED_DISP pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:27.349420 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 01:25:27.354221 kernel: audit: type=1104 audit(1757121927.337:444): pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:27.354254 systemd-logind[1185]: Session 9 logged out. Waiting for processes to exit. Sep 6 01:25:27.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.46:22-139.178.89.65:52866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:27.360178 kernel: audit: type=1131 audit(1757121927.347:445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.46:22-139.178.89.65:52866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:27.360925 systemd-logind[1185]: Removed session 9. Sep 6 01:25:27.384892 env[1193]: time="2025-09-06T01:25:27.384707454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6jbhl,Uid:b4ac34fb-14af-4d55-b965-66418e9bc4c9,Namespace:kube-system,Attempt:0,}" Sep 6 01:25:27.393033 env[1193]: time="2025-09-06T01:25:27.392418105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cnrhf,Uid:b98d6291-edba-4bc3-b5e2-817d3bbfdb76,Namespace:calico-system,Attempt:0,}" Sep 6 01:25:28.038591 kubelet[1505]: E0906 01:25:28.038513 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:28.223926 kubelet[1505]: E0906 01:25:28.222896 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:28.248182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2866374596.mount: Deactivated successfully. Sep 6 01:25:28.252176 env[1193]: time="2025-09-06T01:25:28.252075323Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.254172 env[1193]: time="2025-09-06T01:25:28.254134458Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.254997 env[1193]: time="2025-09-06T01:25:28.254968161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.256733 env[1193]: time="2025-09-06T01:25:28.256702940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.258969 env[1193]: time="2025-09-06T01:25:28.258932985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.260591 env[1193]: time="2025-09-06T01:25:28.260560259Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.261174 env[1193]: time="2025-09-06T01:25:28.261152269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.262194 env[1193]: time="2025-09-06T01:25:28.262169148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.286995 env[1193]: time="2025-09-06T01:25:28.286275712Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:25:28.286995 env[1193]: time="2025-09-06T01:25:28.286308934Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:25:28.286995 env[1193]: time="2025-09-06T01:25:28.286320205Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:25:28.286995 env[1193]: time="2025-09-06T01:25:28.286469480Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/895d5357859e76cbf1c485d48503f76d135747984b17cd24c14545f0aab42737 pid=1584 runtime=io.containerd.runc.v2 Sep 6 01:25:28.289141 env[1193]: time="2025-09-06T01:25:28.283327798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:25:28.289141 env[1193]: time="2025-09-06T01:25:28.283377545Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:25:28.289141 env[1193]: time="2025-09-06T01:25:28.283389878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:25:28.289141 env[1193]: time="2025-09-06T01:25:28.283597955Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f pid=1583 runtime=io.containerd.runc.v2 Sep 6 01:25:28.309049 systemd[1]: Started cri-containerd-895d5357859e76cbf1c485d48503f76d135747984b17cd24c14545f0aab42737.scope. Sep 6 01:25:28.310396 systemd[1]: Started cri-containerd-c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f.scope. Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336145 kernel: audit: type=1400 audit(1757121928.329:446): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.342875 kernel: audit: type=1400 audit(1757121928.329:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.342942 kernel: audit: type=1400 audit(1757121928.329:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.349134 kernel: audit: type=1400 audit(1757121928.329:449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.353577 kernel: audit: type=1400 audit(1757121928.329:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.329000 audit: BPF prog-id=64 op=LOAD Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356435333537383539653736636266316334383564343835303366 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356435333537383539653736636266316334383564343835303366 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit: BPF prog-id=65 op=LOAD Sep 6 01:25:28.335000 audit[1604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000185b60 items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356435333537383539653736636266316334383564343835303366 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.335000 audit: BPF prog-id=66 op=LOAD Sep 6 01:25:28.335000 audit[1604]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000185ba8 items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356435333537383539653736636266316334383564343835303366 Sep 6 01:25:28.335000 audit: BPF prog-id=66 op=UNLOAD Sep 6 01:25:28.336000 audit: BPF prog-id=65 op=UNLOAD Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { perfmon } for pid=1604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit[1604]: AVC avc: denied { bpf } for pid=1604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.336000 audit: BPF prog-id=67 op=LOAD Sep 6 01:25:28.336000 audit[1604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000185fb8 items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356435333537383539653736636266316334383564343835303366 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.359000 audit: BPF prog-id=68 op=LOAD Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1583 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332306437303264356638356562383135613036313537383963636135 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1583 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332306437303264356638356562383135613036313537383963636135 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.360000 audit: BPF prog-id=69 op=LOAD Sep 6 01:25:28.360000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003b88e0 items=0 ppid=1583 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332306437303264356638356562383135613036313537383963636135 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.361000 audit: BPF prog-id=70 op=LOAD Sep 6 01:25:28.361000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003b8928 items=0 ppid=1583 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332306437303264356638356562383135613036313537383963636135 Sep 6 01:25:28.362000 audit: BPF prog-id=70 op=UNLOAD Sep 6 01:25:28.362000 audit: BPF prog-id=69 op=UNLOAD Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { perfmon } for pid=1601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit[1601]: AVC avc: denied { bpf } for pid=1601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.362000 audit: BPF prog-id=71 op=LOAD Sep 6 01:25:28.362000 audit[1601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b8d38 items=0 ppid=1583 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332306437303264356638356562383135613036313537383963636135 Sep 6 01:25:28.367953 env[1193]: time="2025-09-06T01:25:28.367907003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6jbhl,Uid:b4ac34fb-14af-4d55-b965-66418e9bc4c9,Namespace:kube-system,Attempt:0,} returns sandbox id \"895d5357859e76cbf1c485d48503f76d135747984b17cd24c14545f0aab42737\"" Sep 6 01:25:28.371487 env[1193]: time="2025-09-06T01:25:28.371446946Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\"" Sep 6 01:25:28.386070 env[1193]: time="2025-09-06T01:25:28.386016998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cnrhf,Uid:b98d6291-edba-4bc3-b5e2-817d3bbfdb76,Namespace:calico-system,Attempt:0,} returns sandbox id \"c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f\"" Sep 6 01:25:29.039246 kubelet[1505]: E0906 01:25:29.039147 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:29.846007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount10507080.mount: Deactivated successfully. Sep 6 01:25:30.040292 kubelet[1505]: E0906 01:25:30.040204 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:30.224213 kubelet[1505]: E0906 01:25:30.223368 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:31.041421 kubelet[1505]: E0906 01:25:31.041341 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:32.042149 kubelet[1505]: E0906 01:25:32.042011 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:32.066563 env[1193]: time="2025-09-06T01:25:32.066455473Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:32.068068 env[1193]: time="2025-09-06T01:25:32.068017202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:507cc52f5f78c0cff25e904c76c18e6bfc90982e9cc2aa4dcb19033f21c3f679,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:32.069516 env[1193]: time="2025-09-06T01:25:32.069469227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:32.070877 env[1193]: time="2025-09-06T01:25:32.070836202Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:90aa6b5f4065937521ff8438bc705317485d0be3f8b00a07145e697d92cc2cc6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:32.071315 env[1193]: time="2025-09-06T01:25:32.071270862Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\" returns image reference \"sha256:507cc52f5f78c0cff25e904c76c18e6bfc90982e9cc2aa4dcb19033f21c3f679\"" Sep 6 01:25:32.074427 env[1193]: time="2025-09-06T01:25:32.073881420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 01:25:32.077418 env[1193]: time="2025-09-06T01:25:32.077347790Z" level=info msg="CreateContainer within sandbox \"895d5357859e76cbf1c485d48503f76d135747984b17cd24c14545f0aab42737\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 01:25:32.091546 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1491106392.mount: Deactivated successfully. Sep 6 01:25:32.096781 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1550802347.mount: Deactivated successfully. Sep 6 01:25:32.100451 env[1193]: time="2025-09-06T01:25:32.100397257Z" level=info msg="CreateContainer within sandbox \"895d5357859e76cbf1c485d48503f76d135747984b17cd24c14545f0aab42737\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8795ef873a698d2db22cca4f1c02d22348cd25a0ca020c27ec7c0c1c8e4eccab\"" Sep 6 01:25:32.101214 env[1193]: time="2025-09-06T01:25:32.101189078Z" level=info msg="StartContainer for \"8795ef873a698d2db22cca4f1c02d22348cd25a0ca020c27ec7c0c1c8e4eccab\"" Sep 6 01:25:32.125877 systemd[1]: Started cri-containerd-8795ef873a698d2db22cca4f1c02d22348cd25a0ca020c27ec7c0c1c8e4eccab.scope. Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f48e46a1a18 items=0 ppid=1584 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393565663837336136393864326462323263636134663163303264 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit: BPF prog-id=72 op=LOAD Sep 6 01:25:32.148000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000dfba8 items=0 ppid=1584 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393565663837336136393864326462323263636134663163303264 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit: BPF prog-id=73 op=LOAD Sep 6 01:25:32.148000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000dfbf8 items=0 ppid=1584 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393565663837336136393864326462323263636134663163303264 Sep 6 01:25:32.148000 audit: BPF prog-id=73 op=UNLOAD Sep 6 01:25:32.148000 audit: BPF prog-id=72 op=UNLOAD Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { perfmon } for pid=1659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit[1659]: AVC avc: denied { bpf } for pid=1659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:32.148000 audit: BPF prog-id=74 op=LOAD Sep 6 01:25:32.148000 audit[1659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000dfc88 items=0 ppid=1584 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393565663837336136393864326462323263636134663163303264 Sep 6 01:25:32.175251 env[1193]: time="2025-09-06T01:25:32.175183590Z" level=info msg="StartContainer for \"8795ef873a698d2db22cca4f1c02d22348cd25a0ca020c27ec7c0c1c8e4eccab\" returns successfully" Sep 6 01:25:32.224048 kubelet[1505]: E0906 01:25:32.223605 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:32.271969 kubelet[1505]: I0906 01:25:32.271873 1505 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6jbhl" podStartSLOduration=2.569341028 podStartE2EDuration="6.271828019s" podCreationTimestamp="2025-09-06 01:25:26 +0000 UTC" firstStartedPulling="2025-09-06 01:25:28.370867182 +0000 UTC m=+2.720275475" lastFinishedPulling="2025-09-06 01:25:32.073354106 +0000 UTC m=+6.422762466" observedRunningTime="2025-09-06 01:25:32.27144024 +0000 UTC m=+6.620848541" watchObservedRunningTime="2025-09-06 01:25:32.271828019 +0000 UTC m=+6.621236350" Sep 6 01:25:32.301828 kubelet[1505]: E0906 01:25:32.301608 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.302213 kubelet[1505]: W0906 01:25:32.302151 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.302430 kubelet[1505]: E0906 01:25:32.302404 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.305321 kubelet[1505]: E0906 01:25:32.305266 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.305892 kubelet[1505]: W0906 01:25:32.305830 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.306298 kubelet[1505]: E0906 01:25:32.306087 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.307431 kubelet[1505]: E0906 01:25:32.307390 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.307701 kubelet[1505]: W0906 01:25:32.307662 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.307928 kubelet[1505]: E0906 01:25:32.307893 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.309367 kubelet[1505]: E0906 01:25:32.309312 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.309611 kubelet[1505]: W0906 01:25:32.309573 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.309811 kubelet[1505]: E0906 01:25:32.309776 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.310574 kubelet[1505]: E0906 01:25:32.310540 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.310863 kubelet[1505]: W0906 01:25:32.310811 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.311084 kubelet[1505]: E0906 01:25:32.311035 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.311861 kubelet[1505]: E0906 01:25:32.311828 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.312076 kubelet[1505]: W0906 01:25:32.312040 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.312317 kubelet[1505]: E0906 01:25:32.312281 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.312995 kubelet[1505]: E0906 01:25:32.312963 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.315296 kubelet[1505]: W0906 01:25:32.315243 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.315471 kubelet[1505]: E0906 01:25:32.315453 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.315774 kubelet[1505]: E0906 01:25:32.315759 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.315863 kubelet[1505]: W0906 01:25:32.315847 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.315943 kubelet[1505]: E0906 01:25:32.315928 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.316238 kubelet[1505]: E0906 01:25:32.316224 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.316341 kubelet[1505]: W0906 01:25:32.316325 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.316448 kubelet[1505]: E0906 01:25:32.316433 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.316718 kubelet[1505]: E0906 01:25:32.316704 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.316803 kubelet[1505]: W0906 01:25:32.316787 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.316886 kubelet[1505]: E0906 01:25:32.316872 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.317157 kubelet[1505]: E0906 01:25:32.317144 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.317266 kubelet[1505]: W0906 01:25:32.317249 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.317344 kubelet[1505]: E0906 01:25:32.317329 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.317655 kubelet[1505]: E0906 01:25:32.317638 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.317743 kubelet[1505]: W0906 01:25:32.317727 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.317826 kubelet[1505]: E0906 01:25:32.317812 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.319057 kubelet[1505]: E0906 01:25:32.319034 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.319183 kubelet[1505]: W0906 01:25:32.319165 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.319278 kubelet[1505]: E0906 01:25:32.319263 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.319584 kubelet[1505]: E0906 01:25:32.319570 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.319678 kubelet[1505]: W0906 01:25:32.319662 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.319762 kubelet[1505]: E0906 01:25:32.319748 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.320060 kubelet[1505]: E0906 01:25:32.320045 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.320204 kubelet[1505]: W0906 01:25:32.320187 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.320285 kubelet[1505]: E0906 01:25:32.320270 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.320582 kubelet[1505]: E0906 01:25:32.320566 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.320675 kubelet[1505]: W0906 01:25:32.320658 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.320753 kubelet[1505]: E0906 01:25:32.320739 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.321242 kubelet[1505]: E0906 01:25:32.321224 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.321353 kubelet[1505]: W0906 01:25:32.321336 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.321470 kubelet[1505]: E0906 01:25:32.321451 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.321751 kubelet[1505]: E0906 01:25:32.321737 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.321833 kubelet[1505]: W0906 01:25:32.321818 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.321910 kubelet[1505]: E0906 01:25:32.321895 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.322602 kubelet[1505]: E0906 01:25:32.322582 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.322718 kubelet[1505]: W0906 01:25:32.322701 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.322799 kubelet[1505]: E0906 01:25:32.322785 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.323064 kubelet[1505]: E0906 01:25:32.323050 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.323185 kubelet[1505]: W0906 01:25:32.323169 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.323274 kubelet[1505]: E0906 01:25:32.323260 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.323684 kubelet[1505]: E0906 01:25:32.323666 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.323789 kubelet[1505]: W0906 01:25:32.323773 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.323890 kubelet[1505]: E0906 01:25:32.323873 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.324235 kubelet[1505]: E0906 01:25:32.324218 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.324343 kubelet[1505]: W0906 01:25:32.324327 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.324456 kubelet[1505]: E0906 01:25:32.324441 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.324733 kubelet[1505]: E0906 01:25:32.324710 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.324733 kubelet[1505]: W0906 01:25:32.324729 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.324850 kubelet[1505]: E0906 01:25:32.324747 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.324967 kubelet[1505]: E0906 01:25:32.324900 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.324967 kubelet[1505]: W0906 01:25:32.324911 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.324967 kubelet[1505]: E0906 01:25:32.324920 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.325101 kubelet[1505]: E0906 01:25:32.325049 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.325101 kubelet[1505]: W0906 01:25:32.325055 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.325101 kubelet[1505]: E0906 01:25:32.325063 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.325272 kubelet[1505]: E0906 01:25:32.325241 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.325272 kubelet[1505]: W0906 01:25:32.325249 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.325272 kubelet[1505]: E0906 01:25:32.325260 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.325590 kubelet[1505]: E0906 01:25:32.325575 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.325691 kubelet[1505]: W0906 01:25:32.325675 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.325777 kubelet[1505]: E0906 01:25:32.325764 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.326008 kubelet[1505]: E0906 01:25:32.325993 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.326008 kubelet[1505]: W0906 01:25:32.326005 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.326099 kubelet[1505]: E0906 01:25:32.326022 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.326299 kubelet[1505]: E0906 01:25:32.326219 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.326299 kubelet[1505]: W0906 01:25:32.326229 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.326299 kubelet[1505]: E0906 01:25:32.326239 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.326566 kubelet[1505]: E0906 01:25:32.326553 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.326566 kubelet[1505]: W0906 01:25:32.326564 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.326657 kubelet[1505]: E0906 01:25:32.326573 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.326808 kubelet[1505]: E0906 01:25:32.326793 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.326808 kubelet[1505]: W0906 01:25:32.326804 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.326901 kubelet[1505]: E0906 01:25:32.326812 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.327107 kubelet[1505]: E0906 01:25:32.327091 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:32.327107 kubelet[1505]: W0906 01:25:32.327102 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:32.327215 kubelet[1505]: E0906 01:25:32.327131 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:32.338000 audit[1751]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.341989 kernel: kauditd_printk_skb: 152 callbacks suppressed Sep 6 01:25:32.342082 kernel: audit: type=1325 audit(1757121932.338:488): table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.342141 kernel: audit: type=1300 audit(1757121932.338:488): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe713f4df0 a2=0 a3=7ffe713f4ddc items=0 ppid=1670 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.338000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe713f4df0 a2=0 a3=7ffe713f4ddc items=0 ppid=1670 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:25:32.342000 audit[1752]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.351432 kernel: audit: type=1327 audit(1757121932.338:488): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:25:32.351508 kernel: audit: type=1325 audit(1757121932.342:489): table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.351538 kernel: audit: type=1300 audit(1757121932.342:489): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd48a6160 a2=0 a3=7ffdd48a614c items=0 ppid=1670 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.342000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd48a6160 a2=0 a3=7ffdd48a614c items=0 ppid=1670 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:25:32.357892 kernel: audit: type=1327 audit(1757121932.342:489): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:25:32.357957 kernel: audit: type=1325 audit(1757121932.343:490): table=nat:16 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.343000 audit[1753]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.343000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff04b2dee0 a2=0 a3=7fff04b2decc items=0 ppid=1670 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.364274 kernel: audit: type=1300 audit(1757121932.343:490): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff04b2dee0 a2=0 a3=7fff04b2decc items=0 ppid=1670 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.364332 kernel: audit: type=1327 audit(1757121932.343:490): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:25:32.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:25:32.345000 audit[1754]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.368503 kernel: audit: type=1325 audit(1757121932.345:491): table=filter:17 family=2 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.345000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb81ee840 a2=0 a3=7fffb81ee82c items=0 ppid=1670 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:25:32.346000 audit[1755]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.346000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26189580 a2=0 a3=7ffd2618956c items=0 ppid=1670 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:25:32.349000 audit[1756]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.349000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed2b657c0 a2=0 a3=7ffed2b657ac items=0 ppid=1670 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:25:32.441000 audit[1757]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.441000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcd6fa3ea0 a2=0 a3=7ffcd6fa3e8c items=0 ppid=1670 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:25:32.447000 audit[1759]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.447000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc4f95d290 a2=0 a3=7ffc4f95d27c items=0 ppid=1670 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 01:25:32.452000 audit[1762]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.452000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdef151120 a2=0 a3=7ffdef15110c items=0 ppid=1670 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 01:25:32.454000 audit[1763]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.454000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffce641c60 a2=0 a3=7fffce641c4c items=0 ppid=1670 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:25:32.458000 audit[1765]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.458000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd655f430 a2=0 a3=7ffcd655f41c items=0 ppid=1670 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:25:32.460000 audit[1766]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.460000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa56a9730 a2=0 a3=7fffa56a971c items=0 ppid=1670 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:25:32.462000 audit[1768]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.462000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5096aab0 a2=0 a3=7ffc5096aa9c items=0 ppid=1670 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:25:32.466000 audit[1771]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.466000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4e867c20 a2=0 a3=7ffd4e867c0c items=0 ppid=1670 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 01:25:32.468000 audit[1772]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.468000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecdf22bf0 a2=0 a3=7ffecdf22bdc items=0 ppid=1670 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:25:32.471000 audit[1774]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.471000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff655b3950 a2=0 a3=7fff655b393c items=0 ppid=1670 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:25:32.472000 audit[1775]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.472000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe197c7b40 a2=0 a3=7ffe197c7b2c items=0 ppid=1670 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:25:32.475000 audit[1777]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.475000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc629d5480 a2=0 a3=7ffc629d546c items=0 ppid=1670 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:25:32.479000 audit[1780]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.479000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe53a90930 a2=0 a3=7ffe53a9091c items=0 ppid=1670 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:25:32.483000 audit[1783]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.483000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef106d2f0 a2=0 a3=7ffef106d2dc items=0 ppid=1670 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:25:32.485000 audit[1784]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.485000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc8a481a80 a2=0 a3=7ffc8a481a6c items=0 ppid=1670 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:25:32.487000 audit[1786]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.487000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd32d01200 a2=0 a3=7ffd32d011ec items=0 ppid=1670 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:25:32.519000 audit[1790]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.519000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd03f1bfd0 a2=0 a3=7ffd03f1bfbc items=0 ppid=1670 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:25:32.520000 audit[1791]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.520000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9fad3ad0 a2=0 a3=7ffc9fad3abc items=0 ppid=1670 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:25:32.524000 audit[1793]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:25:32.524000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe82871050 a2=0 a3=7ffe8287103c items=0 ppid=1670 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:25:32.562000 audit[1799]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:32.562000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe9c8ef060 a2=0 a3=7ffe9c8ef04c items=0 ppid=1670 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:32.605000 audit[1799]: NETFILTER_CFG table=nat:40 family=2 entries=72 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:32.605000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=34516 a0=3 a1=7ffe9c8ef060 a2=0 a3=7ffe9c8ef04c items=0 ppid=1670 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:32.625000 audit[1809]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.625000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe93a09920 a2=0 a3=7ffe93a0990c items=0 ppid=1670 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:25:32.631000 audit[1811]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.631000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd3f46e2b0 a2=0 a3=7ffd3f46e29c items=0 ppid=1670 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 01:25:32.638000 audit[1814]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.638000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff172148f0 a2=0 a3=7fff172148dc items=0 ppid=1670 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 01:25:32.640000 audit[1815]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.640000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd79496190 a2=0 a3=7ffd7949617c items=0 ppid=1670 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:25:32.646000 audit[1817]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.646000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd37cb270 a2=0 a3=7fffd37cb25c items=0 ppid=1670 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:25:32.648000 audit[1818]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.648000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8fedcbd0 a2=0 a3=7ffc8fedcbbc items=0 ppid=1670 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:25:32.651000 audit[1820]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.651000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec0d2a380 a2=0 a3=7ffec0d2a36c items=0 ppid=1670 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 01:25:32.655000 audit[1823]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.655000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc6c6dc900 a2=0 a3=7ffc6c6dc8ec items=0 ppid=1670 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:25:32.657000 audit[1824]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.657000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd071e7db0 a2=0 a3=7ffd071e7d9c items=0 ppid=1670 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:25:32.662000 audit[1826]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.662000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd78726400 a2=0 a3=7ffd787263ec items=0 ppid=1670 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:25:32.664000 audit[1827]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.664000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd3c001a0 a2=0 a3=7fffd3c0018c items=0 ppid=1670 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:25:32.667000 audit[1829]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.667000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc48b12950 a2=0 a3=7ffc48b1293c items=0 ppid=1670 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:25:32.672000 audit[1832]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.672000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3631c540 a2=0 a3=7ffc3631c52c items=0 ppid=1670 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:25:32.676000 audit[1835]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.676000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd9cdaf90 a2=0 a3=7ffcd9cdaf7c items=0 ppid=1670 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 01:25:32.679000 audit[1836]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.679000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc785c0f60 a2=0 a3=7ffc785c0f4c items=0 ppid=1670 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:25:32.682000 audit[1838]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.682000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe03ebcaa0 a2=0 a3=7ffe03ebca8c items=0 ppid=1670 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:25:32.687000 audit[1841]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.687000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc62f70cc0 a2=0 a3=7ffc62f70cac items=0 ppid=1670 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:25:32.688000 audit[1842]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.688000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff38228e80 a2=0 a3=7fff38228e6c items=0 ppid=1670 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:25:32.691000 audit[1844]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.691000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd4939c300 a2=0 a3=7ffd4939c2ec items=0 ppid=1670 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:25:32.693000 audit[1845]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.693000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefb6794f0 a2=0 a3=7ffefb6794dc items=0 ppid=1670 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:25:32.696000 audit[1847]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.696000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe4be5b770 a2=0 a3=7ffe4be5b75c items=0 ppid=1670 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:25:32.700000 audit[1850]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:25:32.700000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc119bbff0 a2=0 a3=7ffc119bbfdc items=0 ppid=1670 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:25:32.703000 audit[1852]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:25:32.703000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffee7e935e0 a2=0 a3=7ffee7e935cc items=0 ppid=1670 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.703000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:32.704000 audit[1852]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:25:32.704000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffee7e935e0 a2=0 a3=7ffee7e935cc items=0 ppid=1670 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:32.704000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:33.043102 kubelet[1505]: E0906 01:25:33.043014 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:33.331849 kubelet[1505]: E0906 01:25:33.331191 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.331849 kubelet[1505]: W0906 01:25:33.331239 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.331849 kubelet[1505]: E0906 01:25:33.331282 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.332482 kubelet[1505]: E0906 01:25:33.332251 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.332482 kubelet[1505]: W0906 01:25:33.332283 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.332482 kubelet[1505]: E0906 01:25:33.332320 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.332803 kubelet[1505]: E0906 01:25:33.332751 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.332803 kubelet[1505]: W0906 01:25:33.332771 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.332803 kubelet[1505]: E0906 01:25:33.332793 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.333240 kubelet[1505]: E0906 01:25:33.333198 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.333240 kubelet[1505]: W0906 01:25:33.333224 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.333461 kubelet[1505]: E0906 01:25:33.333248 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.333670 kubelet[1505]: E0906 01:25:33.333644 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.333670 kubelet[1505]: W0906 01:25:33.333669 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.333875 kubelet[1505]: E0906 01:25:33.333691 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.334157 kubelet[1505]: E0906 01:25:33.334047 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.334157 kubelet[1505]: W0906 01:25:33.334071 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.334157 kubelet[1505]: E0906 01:25:33.334091 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.334667 kubelet[1505]: E0906 01:25:33.334460 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.334667 kubelet[1505]: W0906 01:25:33.334477 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.334667 kubelet[1505]: E0906 01:25:33.334497 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.335005 kubelet[1505]: E0906 01:25:33.334824 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.335005 kubelet[1505]: W0906 01:25:33.334841 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.335005 kubelet[1505]: E0906 01:25:33.334860 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.335280 kubelet[1505]: E0906 01:25:33.335247 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.335280 kubelet[1505]: W0906 01:25:33.335265 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.335466 kubelet[1505]: E0906 01:25:33.335286 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.335672 kubelet[1505]: E0906 01:25:33.335602 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.335672 kubelet[1505]: W0906 01:25:33.335619 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.335672 kubelet[1505]: E0906 01:25:33.335637 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.336010 kubelet[1505]: E0906 01:25:33.335950 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.336010 kubelet[1505]: W0906 01:25:33.335967 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.336010 kubelet[1505]: E0906 01:25:33.336004 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.336399 kubelet[1505]: E0906 01:25:33.336340 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.336399 kubelet[1505]: W0906 01:25:33.336354 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.336399 kubelet[1505]: E0906 01:25:33.336369 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.336701 kubelet[1505]: E0906 01:25:33.336643 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.336701 kubelet[1505]: W0906 01:25:33.336661 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.336701 kubelet[1505]: E0906 01:25:33.336676 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.337078 kubelet[1505]: E0906 01:25:33.336947 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.337078 kubelet[1505]: W0906 01:25:33.336966 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.337078 kubelet[1505]: E0906 01:25:33.336982 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.337353 kubelet[1505]: E0906 01:25:33.337321 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.337420 kubelet[1505]: W0906 01:25:33.337380 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.337420 kubelet[1505]: E0906 01:25:33.337407 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.337839 kubelet[1505]: E0906 01:25:33.337709 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.337839 kubelet[1505]: W0906 01:25:33.337729 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.337839 kubelet[1505]: E0906 01:25:33.337745 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.338271 kubelet[1505]: E0906 01:25:33.338041 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.338271 kubelet[1505]: W0906 01:25:33.338055 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.338271 kubelet[1505]: E0906 01:25:33.338070 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.338468 kubelet[1505]: E0906 01:25:33.338362 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.338468 kubelet[1505]: W0906 01:25:33.338376 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.338468 kubelet[1505]: E0906 01:25:33.338391 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.338757 kubelet[1505]: E0906 01:25:33.338638 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.338757 kubelet[1505]: W0906 01:25:33.338659 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.338757 kubelet[1505]: E0906 01:25:33.338674 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.339096 kubelet[1505]: E0906 01:25:33.338937 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.339096 kubelet[1505]: W0906 01:25:33.338951 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.339096 kubelet[1505]: E0906 01:25:33.338966 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.431575 kubelet[1505]: E0906 01:25:33.431527 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.431575 kubelet[1505]: W0906 01:25:33.431560 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.431575 kubelet[1505]: E0906 01:25:33.431591 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.431933 kubelet[1505]: E0906 01:25:33.431923 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.431975 kubelet[1505]: W0906 01:25:33.431937 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.431975 kubelet[1505]: E0906 01:25:33.431959 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.432329 kubelet[1505]: E0906 01:25:33.432310 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.432386 kubelet[1505]: W0906 01:25:33.432331 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.432386 kubelet[1505]: E0906 01:25:33.432355 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.432624 kubelet[1505]: E0906 01:25:33.432608 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.432670 kubelet[1505]: W0906 01:25:33.432626 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.432670 kubelet[1505]: E0906 01:25:33.432648 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.432922 kubelet[1505]: E0906 01:25:33.432904 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.432972 kubelet[1505]: W0906 01:25:33.432924 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.432972 kubelet[1505]: E0906 01:25:33.432947 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.433288 kubelet[1505]: E0906 01:25:33.433270 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.433350 kubelet[1505]: W0906 01:25:33.433293 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.433761 kubelet[1505]: E0906 01:25:33.433423 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.433761 kubelet[1505]: E0906 01:25:33.433528 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.433761 kubelet[1505]: W0906 01:25:33.433544 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.433761 kubelet[1505]: E0906 01:25:33.433562 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.433937 kubelet[1505]: E0906 01:25:33.433802 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.433937 kubelet[1505]: W0906 01:25:33.433816 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.433937 kubelet[1505]: E0906 01:25:33.433836 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.434124 kubelet[1505]: E0906 01:25:33.434097 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.434189 kubelet[1505]: W0906 01:25:33.434139 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.434189 kubelet[1505]: E0906 01:25:33.434161 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.434469 kubelet[1505]: E0906 01:25:33.434451 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.434528 kubelet[1505]: W0906 01:25:33.434470 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.434528 kubelet[1505]: E0906 01:25:33.434491 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.435191 kubelet[1505]: E0906 01:25:33.434947 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.435191 kubelet[1505]: W0906 01:25:33.434965 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.435191 kubelet[1505]: E0906 01:25:33.434991 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.435786 kubelet[1505]: E0906 01:25:33.435766 1505 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:25:33.435786 kubelet[1505]: W0906 01:25:33.435781 1505 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:25:33.435923 kubelet[1505]: E0906 01:25:33.435793 1505 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:25:33.462151 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1764519805.mount: Deactivated successfully. Sep 6 01:25:33.590975 env[1193]: time="2025-09-06T01:25:33.588724213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:33.592386 env[1193]: time="2025-09-06T01:25:33.592341888Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:33.593912 env[1193]: time="2025-09-06T01:25:33.593885909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:33.595287 env[1193]: time="2025-09-06T01:25:33.595261770Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:33.596097 env[1193]: time="2025-09-06T01:25:33.596052773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 01:25:33.599936 env[1193]: time="2025-09-06T01:25:33.599901603Z" level=info msg="CreateContainer within sandbox \"c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 01:25:33.610312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3210439020.mount: Deactivated successfully. Sep 6 01:25:33.613732 env[1193]: time="2025-09-06T01:25:33.613670142Z" level=info msg="CreateContainer within sandbox \"c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4929a8851981a86e809053722e802b7cc8a53f733d721c980f960aced6628c2f\"" Sep 6 01:25:33.614418 env[1193]: time="2025-09-06T01:25:33.614386500Z" level=info msg="StartContainer for \"4929a8851981a86e809053722e802b7cc8a53f733d721c980f960aced6628c2f\"" Sep 6 01:25:33.631790 systemd[1]: Started cri-containerd-4929a8851981a86e809053722e802b7cc8a53f733d721c980f960aced6628c2f.scope. Sep 6 01:25:33.651000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.651000 audit[1893]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f916d93a8d8 items=0 ppid=1583 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:33.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323961383835313938316138366538303930353337323265383032 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit: BPF prog-id=75 op=LOAD Sep 6 01:25:33.652000 audit[1893]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000270058 items=0 ppid=1583 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:33.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323961383835313938316138366538303930353337323265383032 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit: BPF prog-id=76 op=LOAD Sep 6 01:25:33.652000 audit[1893]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002700a8 items=0 ppid=1583 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:33.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323961383835313938316138366538303930353337323265383032 Sep 6 01:25:33.652000 audit: BPF prog-id=76 op=UNLOAD Sep 6 01:25:33.652000 audit: BPF prog-id=75 op=UNLOAD Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { perfmon } for pid=1893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit[1893]: AVC avc: denied { bpf } for pid=1893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:33.652000 audit: BPF prog-id=77 op=LOAD Sep 6 01:25:33.652000 audit[1893]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000270138 items=0 ppid=1583 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:33.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439323961383835313938316138366538303930353337323265383032 Sep 6 01:25:33.670565 env[1193]: time="2025-09-06T01:25:33.670522105Z" level=info msg="StartContainer for \"4929a8851981a86e809053722e802b7cc8a53f733d721c980f960aced6628c2f\" returns successfully" Sep 6 01:25:33.679952 systemd[1]: cri-containerd-4929a8851981a86e809053722e802b7cc8a53f733d721c980f960aced6628c2f.scope: Deactivated successfully. Sep 6 01:25:33.682000 audit: BPF prog-id=77 op=UNLOAD Sep 6 01:25:33.751950 env[1193]: time="2025-09-06T01:25:33.751833109Z" level=info msg="shim disconnected" id=4929a8851981a86e809053722e802b7cc8a53f733d721c980f960aced6628c2f Sep 6 01:25:33.751950 env[1193]: time="2025-09-06T01:25:33.751930036Z" level=warning msg="cleaning up after shim disconnected" id=4929a8851981a86e809053722e802b7cc8a53f733d721c980f960aced6628c2f namespace=k8s.io Sep 6 01:25:33.751950 env[1193]: time="2025-09-06T01:25:33.751950410Z" level=info msg="cleaning up dead shim" Sep 6 01:25:33.770025 env[1193]: time="2025-09-06T01:25:33.769957658Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:25:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1931 runtime=io.containerd.runc.v2\n" Sep 6 01:25:34.043727 kubelet[1505]: E0906 01:25:34.043636 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:34.224371 kubelet[1505]: E0906 01:25:34.223662 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:34.268684 env[1193]: time="2025-09-06T01:25:34.268621912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 01:25:34.762163 update_engine[1188]: I0906 01:25:34.761951 1188 update_attempter.cc:509] Updating boot flags... Sep 6 01:25:35.044632 kubelet[1505]: E0906 01:25:35.044087 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:36.044714 kubelet[1505]: E0906 01:25:36.044483 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:36.223928 kubelet[1505]: E0906 01:25:36.223563 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:37.045913 kubelet[1505]: E0906 01:25:37.045789 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:38.047108 kubelet[1505]: E0906 01:25:38.047048 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:38.224869 kubelet[1505]: E0906 01:25:38.224784 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:38.672656 env[1193]: time="2025-09-06T01:25:38.672560344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:38.676477 env[1193]: time="2025-09-06T01:25:38.676427663Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:38.679201 env[1193]: time="2025-09-06T01:25:38.679162710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:38.681313 env[1193]: time="2025-09-06T01:25:38.681288946Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:38.682277 env[1193]: time="2025-09-06T01:25:38.682213328Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 01:25:38.685073 env[1193]: time="2025-09-06T01:25:38.685048956Z" level=info msg="CreateContainer within sandbox \"c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 01:25:38.696168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount517525256.mount: Deactivated successfully. Sep 6 01:25:38.699423 env[1193]: time="2025-09-06T01:25:38.699391194Z" level=info msg="CreateContainer within sandbox \"c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b\"" Sep 6 01:25:38.700045 env[1193]: time="2025-09-06T01:25:38.700022966Z" level=info msg="StartContainer for \"f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b\"" Sep 6 01:25:38.718999 systemd[1]: Started cri-containerd-f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b.scope. Sep 6 01:25:38.741000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.746321 kernel: kauditd_printk_skb: 187 callbacks suppressed Sep 6 01:25:38.746416 kernel: audit: type=1400 audit(1757121938.741:546): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.741000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f33c427e6a8 items=0 ppid=1583 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:38.753167 kernel: audit: type=1300 audit(1757121938.741:546): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f33c427e6a8 items=0 ppid=1583 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:38.753316 kernel: audit: type=1327 audit(1757121938.741:546): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643361313036643162343637366639656535633331333238386138 Sep 6 01:25:38.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643361313036643162343637366639656535633331333238386138 Sep 6 01:25:38.757023 kernel: audit: type=1400 audit(1757121938.745:547): avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.759943 kernel: audit: type=1400 audit(1757121938.745:547): avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.765207 kernel: audit: type=1400 audit(1757121938.745:547): avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.765270 kernel: audit: type=1400 audit(1757121938.745:547): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.774198 kernel: audit: type=1400 audit(1757121938.745:547): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.774270 kernel: audit: type=1400 audit(1757121938.745:547): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.777312 kernel: audit: type=1400 audit(1757121938.745:547): avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.745000 audit: BPF prog-id=78 op=LOAD Sep 6 01:25:38.745000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c6068 items=0 ppid=1583 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:38.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643361313036643162343637366639656535633331333238386138 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.749000 audit: BPF prog-id=79 op=LOAD Sep 6 01:25:38.749000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c60b8 items=0 ppid=1583 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:38.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643361313036643162343637366639656535633331333238386138 Sep 6 01:25:38.760000 audit: BPF prog-id=79 op=UNLOAD Sep 6 01:25:38.760000 audit: BPF prog-id=78 op=UNLOAD Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { perfmon } for pid=1969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit[1969]: AVC avc: denied { bpf } for pid=1969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:38.760000 audit: BPF prog-id=80 op=LOAD Sep 6 01:25:38.760000 audit[1969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c6148 items=0 ppid=1583 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:38.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634643361313036643162343637366639656535633331333238386138 Sep 6 01:25:38.788239 env[1193]: time="2025-09-06T01:25:38.788194893Z" level=info msg="StartContainer for \"f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b\" returns successfully" Sep 6 01:25:39.047752 kubelet[1505]: E0906 01:25:39.047614 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:39.267000 audit[1999]: NETFILTER_CFG table=filter:65 family=2 entries=9 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:39.267000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcdad15ec0 a2=0 a3=7ffcdad15eac items=0 ppid=1670 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:39.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:39.273000 audit[1999]: NETFILTER_CFG table=nat:66 family=2 entries=31 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:39.273000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffcdad15ec0 a2=0 a3=7ffcdad15eac items=0 ppid=1670 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:39.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:39.411374 env[1193]: time="2025-09-06T01:25:39.411232790Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:25:39.417405 systemd[1]: cri-containerd-f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b.scope: Deactivated successfully. Sep 6 01:25:39.419000 audit: BPF prog-id=80 op=UNLOAD Sep 6 01:25:39.453030 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b-rootfs.mount: Deactivated successfully. Sep 6 01:25:39.494839 kubelet[1505]: I0906 01:25:39.494713 1505 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 6 01:25:39.534540 env[1193]: time="2025-09-06T01:25:39.534416671Z" level=info msg="shim disconnected" id=f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b Sep 6 01:25:39.534540 env[1193]: time="2025-09-06T01:25:39.534515740Z" level=warning msg="cleaning up after shim disconnected" id=f4d3a106d1b4676f9ee5c313288a87a8cd74ecf6834817017b3641c62d00216b namespace=k8s.io Sep 6 01:25:39.534540 env[1193]: time="2025-09-06T01:25:39.534536600Z" level=info msg="cleaning up dead shim" Sep 6 01:25:39.548482 env[1193]: time="2025-09-06T01:25:39.548424933Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:25:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2011 runtime=io.containerd.runc.v2\n" Sep 6 01:25:40.048731 kubelet[1505]: E0906 01:25:40.048615 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:40.235525 systemd[1]: Created slice kubepods-besteffort-pod8a839322_0603_41eb_96b8_e1331153712c.slice. Sep 6 01:25:40.238887 env[1193]: time="2025-09-06T01:25:40.238840202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bqtnz,Uid:8a839322-0603-41eb-96b8-e1331153712c,Namespace:calico-system,Attempt:0,}" Sep 6 01:25:40.300280 env[1193]: time="2025-09-06T01:25:40.299796757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 01:25:40.355691 env[1193]: time="2025-09-06T01:25:40.355549209Z" level=error msg="Failed to destroy network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:40.357883 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c-shm.mount: Deactivated successfully. Sep 6 01:25:40.361158 env[1193]: time="2025-09-06T01:25:40.359398544Z" level=error msg="encountered an error cleaning up failed sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:40.361158 env[1193]: time="2025-09-06T01:25:40.359477337Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bqtnz,Uid:8a839322-0603-41eb-96b8-e1331153712c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:40.361322 kubelet[1505]: E0906 01:25:40.360491 1505 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:40.361322 kubelet[1505]: E0906 01:25:40.360645 1505 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bqtnz" Sep 6 01:25:40.361322 kubelet[1505]: E0906 01:25:40.360710 1505 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bqtnz" Sep 6 01:25:40.361514 kubelet[1505]: E0906 01:25:40.360818 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bqtnz_calico-system(8a839322-0603-41eb-96b8-e1331153712c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bqtnz_calico-system(8a839322-0603-41eb-96b8-e1331153712c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:41.049290 kubelet[1505]: E0906 01:25:41.049170 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:41.302269 kubelet[1505]: I0906 01:25:41.302032 1505 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:25:41.304297 env[1193]: time="2025-09-06T01:25:41.304214015Z" level=info msg="StopPodSandbox for \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\"" Sep 6 01:25:41.341224 env[1193]: time="2025-09-06T01:25:41.341061702Z" level=error msg="StopPodSandbox for \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\" failed" error="failed to destroy network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:41.342159 kubelet[1505]: E0906 01:25:41.341836 1505 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:25:41.342159 kubelet[1505]: E0906 01:25:41.341961 1505 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c"} Sep 6 01:25:41.342661 kubelet[1505]: E0906 01:25:41.342509 1505 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8a839322-0603-41eb-96b8-e1331153712c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:25:41.342661 kubelet[1505]: E0906 01:25:41.342598 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8a839322-0603-41eb-96b8-e1331153712c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bqtnz" podUID="8a839322-0603-41eb-96b8-e1331153712c" Sep 6 01:25:42.050084 kubelet[1505]: E0906 01:25:42.049988 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:43.050283 kubelet[1505]: E0906 01:25:43.050195 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:44.050468 kubelet[1505]: E0906 01:25:44.050377 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:45.051221 kubelet[1505]: E0906 01:25:45.051076 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:46.028468 kubelet[1505]: E0906 01:25:46.028334 1505 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:46.051989 kubelet[1505]: E0906 01:25:46.051900 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:46.800281 systemd[1]: Created slice kubepods-besteffort-pod72d07216_0545_4aac_84bc_343a7d59cef5.slice. Sep 6 01:25:46.936272 kubelet[1505]: I0906 01:25:46.936194 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bxh2d\" (UniqueName: \"kubernetes.io/projected/72d07216-0545-4aac-84bc-343a7d59cef5-kube-api-access-bxh2d\") pod \"nginx-deployment-8587fbcb89-tt8xs\" (UID: \"72d07216-0545-4aac-84bc-343a7d59cef5\") " pod="default/nginx-deployment-8587fbcb89-tt8xs" Sep 6 01:25:47.052529 kubelet[1505]: E0906 01:25:47.052337 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:47.105993 env[1193]: time="2025-09-06T01:25:47.105072864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-tt8xs,Uid:72d07216-0545-4aac-84bc-343a7d59cef5,Namespace:default,Attempt:0,}" Sep 6 01:25:47.238032 env[1193]: time="2025-09-06T01:25:47.237931464Z" level=error msg="Failed to destroy network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:47.239810 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79-shm.mount: Deactivated successfully. Sep 6 01:25:47.241869 env[1193]: time="2025-09-06T01:25:47.241821652Z" level=error msg="encountered an error cleaning up failed sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:47.241954 env[1193]: time="2025-09-06T01:25:47.241888881Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-tt8xs,Uid:72d07216-0545-4aac-84bc-343a7d59cef5,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:47.242598 kubelet[1505]: E0906 01:25:47.242193 1505 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:47.242598 kubelet[1505]: E0906 01:25:47.242261 1505 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-tt8xs" Sep 6 01:25:47.242598 kubelet[1505]: E0906 01:25:47.242283 1505 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-tt8xs" Sep 6 01:25:47.242790 kubelet[1505]: E0906 01:25:47.242331 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-tt8xs_default(72d07216-0545-4aac-84bc-343a7d59cef5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-tt8xs_default(72d07216-0545-4aac-84bc-343a7d59cef5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-tt8xs" podUID="72d07216-0545-4aac-84bc-343a7d59cef5" Sep 6 01:25:47.318455 kubelet[1505]: I0906 01:25:47.317184 1505 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:25:47.319439 env[1193]: time="2025-09-06T01:25:47.319379736Z" level=info msg="StopPodSandbox for \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\"" Sep 6 01:25:47.367205 env[1193]: time="2025-09-06T01:25:47.367146415Z" level=error msg="StopPodSandbox for \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\" failed" error="failed to destroy network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:25:47.367741 kubelet[1505]: E0906 01:25:47.367574 1505 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:25:47.367741 kubelet[1505]: E0906 01:25:47.367625 1505 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79"} Sep 6 01:25:47.367741 kubelet[1505]: E0906 01:25:47.367665 1505 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"72d07216-0545-4aac-84bc-343a7d59cef5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:25:47.367741 kubelet[1505]: E0906 01:25:47.367690 1505 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"72d07216-0545-4aac-84bc-343a7d59cef5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-tt8xs" podUID="72d07216-0545-4aac-84bc-343a7d59cef5" Sep 6 01:25:48.055064 kubelet[1505]: E0906 01:25:48.054991 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:49.055755 kubelet[1505]: E0906 01:25:49.055700 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:49.939962 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3542870504.mount: Deactivated successfully. Sep 6 01:25:49.964522 env[1193]: time="2025-09-06T01:25:49.964448657Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:49.965399 env[1193]: time="2025-09-06T01:25:49.965358209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:49.966755 env[1193]: time="2025-09-06T01:25:49.966729225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:49.968456 env[1193]: time="2025-09-06T01:25:49.968427520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:49.969062 env[1193]: time="2025-09-06T01:25:49.969035205Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 01:25:49.984935 env[1193]: time="2025-09-06T01:25:49.984903392Z" level=info msg="CreateContainer within sandbox \"c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 01:25:49.994400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1633040177.mount: Deactivated successfully. Sep 6 01:25:49.997058 env[1193]: time="2025-09-06T01:25:49.997018445Z" level=info msg="CreateContainer within sandbox \"c20d702d5f85eb815a0615789cca5b0e654338ab1285c88bfb6c53f36b566c0f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc\"" Sep 6 01:25:49.997727 env[1193]: time="2025-09-06T01:25:49.997698114Z" level=info msg="StartContainer for \"d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc\"" Sep 6 01:25:50.015709 systemd[1]: Started cri-containerd-d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc.scope. Sep 6 01:25:50.040000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.043823 kernel: kauditd_printk_skb: 40 callbacks suppressed Sep 6 01:25:50.043904 kernel: audit: type=1400 audit(1757121950.040:555): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.040000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7efeacc6e368 items=0 ppid=1583 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:50.050403 kernel: audit: type=1300 audit(1757121950.040:555): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7efeacc6e368 items=0 ppid=1583 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:50.050457 kernel: audit: type=1327 audit(1757121950.040:555): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653731643836666537323961656532306264336266376338323266 Sep 6 01:25:50.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653731643836666537323961656532306264336266376338323266 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.056597 kernel: audit: type=1400 audit(1757121950.042:556): avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.056783 kernel: audit: type=1400 audit(1757121950.042:556): avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.056851 kubelet[1505]: E0906 01:25:50.056721 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.062152 kernel: audit: type=1400 audit(1757121950.042:556): avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.062222 kernel: audit: type=1400 audit(1757121950.042:556): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.067709 kernel: audit: type=1400 audit(1757121950.042:556): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.068364 kernel: audit: type=1400 audit(1757121950.042:556): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.073883 kernel: audit: type=1400 audit(1757121950.042:556): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.042000 audit: BPF prog-id=81 op=LOAD Sep 6 01:25:50.042000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000265d18 items=0 ppid=1583 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:50.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653731643836666537323961656532306264336266376338323266 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.045000 audit: BPF prog-id=82 op=LOAD Sep 6 01:25:50.045000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000265d68 items=0 ppid=1583 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:50.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653731643836666537323961656532306264336266376338323266 Sep 6 01:25:50.052000 audit: BPF prog-id=82 op=UNLOAD Sep 6 01:25:50.053000 audit: BPF prog-id=81 op=UNLOAD Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:50.053000 audit: BPF prog-id=83 op=LOAD Sep 6 01:25:50.053000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000265df8 items=0 ppid=1583 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:50.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653731643836666537323961656532306264336266376338323266 Sep 6 01:25:50.087376 env[1193]: time="2025-09-06T01:25:50.085491997Z" level=info msg="StartContainer for \"d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc\" returns successfully" Sep 6 01:25:50.227250 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 01:25:50.227407 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 01:25:50.363840 kubelet[1505]: I0906 01:25:50.363696 1505 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-cnrhf" podStartSLOduration=2.781076386 podStartE2EDuration="24.3636201s" podCreationTimestamp="2025-09-06 01:25:26 +0000 UTC" firstStartedPulling="2025-09-06 01:25:28.387748939 +0000 UTC m=+2.737157234" lastFinishedPulling="2025-09-06 01:25:49.970292656 +0000 UTC m=+24.319700948" observedRunningTime="2025-09-06 01:25:50.358856456 +0000 UTC m=+24.708264789" watchObservedRunningTime="2025-09-06 01:25:50.3636201 +0000 UTC m=+24.713028487" Sep 6 01:25:51.057837 kubelet[1505]: E0906 01:25:51.057767 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:51.334610 kubelet[1505]: I0906 01:25:51.334401 1505 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 01:25:51.670000 audit[2211]: AVC avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=21655 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:25:51.670000 audit[2211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc90e9d7cc a2=241 a3=1b6 items=1 ppid=2185 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.670000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 01:25:51.670000 audit: PATH item=0 name="/dev/fd/63" inode=22609 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:51.670000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:25:51.673000 audit[2225]: AVC avc: denied { write } for pid=2225 comm="tee" name="fd" dev="proc" ino=21659 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:25:51.673000 audit[2225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc009e27ce a2=241 a3=1b6 items=1 ppid=2186 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.674000 audit[2213]: AVC avc: denied { write } for pid=2213 comm="tee" name="fd" dev="proc" ino=22622 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:25:51.675000 audit[2218]: AVC avc: denied { write } for pid=2218 comm="tee" name="fd" dev="proc" ino=22625 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:25:51.679000 audit[2223]: AVC avc: denied { write } for pid=2223 comm="tee" name="fd" dev="proc" ino=21663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:25:51.679000 audit[2223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefe46a7bc a2=241 a3=1b6 items=1 ppid=2180 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.675000 audit[2218]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8fe1a7cc a2=241 a3=1b6 items=1 ppid=2193 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.675000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 01:25:51.675000 audit: PATH item=0 name="/dev/fd/63" inode=22614 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:51.675000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:25:51.674000 audit[2213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff497497cd a2=241 a3=1b6 items=1 ppid=2182 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.674000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 01:25:51.674000 audit: PATH item=0 name="/dev/fd/63" inode=21637 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:51.674000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:25:51.682000 audit[2233]: AVC avc: denied { write } for pid=2233 comm="tee" name="fd" dev="proc" ino=21667 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:25:51.679000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 01:25:51.679000 audit: PATH item=0 name="/dev/fd/63" inode=21642 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:51.679000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:25:51.673000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 01:25:51.673000 audit: PATH item=0 name="/dev/fd/63" inode=21645 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:51.673000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:25:51.682000 audit[2233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc26cd07bd a2=241 a3=1b6 items=1 ppid=2183 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.682000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 01:25:51.682000 audit: PATH item=0 name="/dev/fd/63" inode=22618 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:51.682000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:25:51.698000 audit[2251]: AVC avc: denied { write } for pid=2251 comm="tee" name="fd" dev="proc" ino=21677 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:25:51.698000 audit[2251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5935d7cc a2=241 a3=1b6 items=1 ppid=2195 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.698000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 01:25:51.698000 audit: PATH item=0 name="/dev/fd/63" inode=21671 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:51.698000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.941000 audit: BPF prog-id=84 op=LOAD Sep 6 01:25:51.941000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedbde3ae0 a2=98 a3=1fffffffffffffff items=0 ppid=2194 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.941000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:25:51.943000 audit: BPF prog-id=84 op=UNLOAD Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.943000 audit: BPF prog-id=85 op=LOAD Sep 6 01:25:51.943000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedbde39c0 a2=94 a3=3 items=0 ppid=2194 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.943000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:25:51.944000 audit: BPF prog-id=85 op=UNLOAD Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit: BPF prog-id=86 op=LOAD Sep 6 01:25:51.944000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedbde3a00 a2=94 a3=7ffedbde3be0 items=0 ppid=2194 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.944000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:25:51.944000 audit: BPF prog-id=86 op=UNLOAD Sep 6 01:25:51.944000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.944000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffedbde3ad0 a2=50 a3=a000000085 items=0 ppid=2194 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.944000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.946000 audit: BPF prog-id=87 op=LOAD Sep 6 01:25:51.946000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6eea4670 a2=98 a3=3 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.946000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:51.947000 audit: BPF prog-id=87 op=UNLOAD Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit: BPF prog-id=88 op=LOAD Sep 6 01:25:51.947000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6eea4460 a2=94 a3=54428f items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:51.947000 audit: BPF prog-id=88 op=UNLOAD Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:51.947000 audit: BPF prog-id=89 op=LOAD Sep 6 01:25:51.947000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6eea4490 a2=94 a3=2 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:51.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:51.947000 audit: BPF prog-id=89 op=UNLOAD Sep 6 01:25:52.000699 systemd[1]: run-containerd-runc-k8s.io-d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc-runc.Wj9xvo.mount: Deactivated successfully. Sep 6 01:25:52.060019 kubelet[1505]: E0906 01:25:52.059946 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit: BPF prog-id=90 op=LOAD Sep 6 01:25:52.119000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6eea4350 a2=94 a3=1 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.119000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.119000 audit: BPF prog-id=90 op=UNLOAD Sep 6 01:25:52.119000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.119000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6eea4420 a2=50 a3=7ffd6eea4500 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.119000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.132000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.132000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6eea4360 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.132000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.132000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6eea4390 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.132000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.132000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6eea42a0 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.132000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.132000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6eea43b0 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.132000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.132000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6eea4390 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.132000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.132000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6eea4380 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.133000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.133000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6eea43b0 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.133000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.133000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6eea4390 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.133000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.133000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6eea43b0 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.133000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.133000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6eea4380 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.133000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.133000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6eea43f0 a2=28 a3=0 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6eea41a0 a2=50 a3=1 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.134000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit: BPF prog-id=91 op=LOAD Sep 6 01:25:52.134000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6eea41a0 a2=94 a3=5 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.134000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.134000 audit: BPF prog-id=91 op=UNLOAD Sep 6 01:25:52.134000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.134000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6eea4250 a2=50 a3=1 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.134000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd6eea4370 a2=4 a3=38 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.135000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.135000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:52.135000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6eea43c0 a2=94 a3=6 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.135000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.136000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:52.136000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6eea3b70 a2=94 a3=88 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.137000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:52.137000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6eea3b70 a2=94 a3=88 items=0 ppid=2194 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.137000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit: BPF prog-id=92 op=LOAD Sep 6 01:25:52.146000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0f2da690 a2=98 a3=1999999999999999 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.146000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:25:52.146000 audit: BPF prog-id=92 op=UNLOAD Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit: BPF prog-id=93 op=LOAD Sep 6 01:25:52.146000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0f2da570 a2=94 a3=ffff items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.146000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:25:52.146000 audit: BPF prog-id=93 op=UNLOAD Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.146000 audit: BPF prog-id=94 op=LOAD Sep 6 01:25:52.146000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0f2da5b0 a2=94 a3=7ffd0f2da790 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.146000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:25:52.147000 audit: BPF prog-id=94 op=UNLOAD Sep 6 01:25:52.241455 systemd-networkd[1031]: vxlan.calico: Link UP Sep 6 01:25:52.241473 systemd-networkd[1031]: vxlan.calico: Gained carrier Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit: BPF prog-id=95 op=LOAD Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef77b15e0 a2=98 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit: BPF prog-id=95 op=UNLOAD Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit: BPF prog-id=96 op=LOAD Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef77b13f0 a2=94 a3=54428f items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit: BPF prog-id=96 op=UNLOAD Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit: BPF prog-id=97 op=LOAD Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef77b1420 a2=94 a3=2 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit: BPF prog-id=97 op=UNLOAD Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef77b12f0 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef77b1320 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef77b1230 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef77b1340 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef77b1320 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.284000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.284000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef77b1310 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef77b1340 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef77b1320 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef77b1340 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef77b1310 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffef77b1380 a2=28 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit: BPF prog-id=98 op=LOAD Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef77b11f0 a2=94 a3=0 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit: BPF prog-id=98 op=UNLOAD Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffef77b11e0 a2=50 a3=2800 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffef77b11e0 a2=50 a3=2800 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit: BPF prog-id=99 op=LOAD Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef77b0a00 a2=94 a3=2 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.287000 audit: BPF prog-id=99 op=UNLOAD Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.287000 audit: BPF prog-id=100 op=LOAD Sep 6 01:25:52.287000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef77b0b00 a2=94 a3=30 items=0 ppid=2194 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit: BPF prog-id=101 op=LOAD Sep 6 01:25:52.291000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee0930970 a2=98 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.291000 audit: BPF prog-id=101 op=UNLOAD Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit: BPF prog-id=102 op=LOAD Sep 6 01:25:52.291000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee0930760 a2=94 a3=54428f items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.291000 audit: BPF prog-id=102 op=UNLOAD Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.291000 audit: BPF prog-id=103 op=LOAD Sep 6 01:25:52.291000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee0930790 a2=94 a3=2 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.291000 audit: BPF prog-id=103 op=UNLOAD Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit: BPF prog-id=104 op=LOAD Sep 6 01:25:52.454000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee0930650 a2=94 a3=1 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.454000 audit: BPF prog-id=104 op=UNLOAD Sep 6 01:25:52.454000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.454000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee0930720 a2=50 a3=7ffee0930800 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.467000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.467000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee0930660 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.467000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.468000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.468000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee0930690 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.468000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.468000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee09305a0 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.468000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.468000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee09306b0 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.468000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.468000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee0930690 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.468000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.468000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee0930680 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.468000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.468000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee09306b0 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.468000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.468000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee0930690 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.469000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.469000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee09306b0 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.469000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.469000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee0930680 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.469000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.469000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee09306f0 a2=28 a3=0 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.469000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.469000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee09304a0 a2=50 a3=1 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit: BPF prog-id=105 op=LOAD Sep 6 01:25:52.470000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee09304a0 a2=94 a3=5 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.470000 audit: BPF prog-id=105 op=UNLOAD Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee0930550 a2=50 a3=1 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.470000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.470000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffee0930670 a2=4 a3=38 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { confidentiality } for pid=2363 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:52.471000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee09306c0 a2=94 a3=6 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.471000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.471000 audit[2363]: AVC avc: denied { confidentiality } for pid=2363 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:52.471000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee092fe70 a2=94 a3=88 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.471000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.472000 audit[2363]: AVC avc: denied { confidentiality } for pid=2363 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:52.472000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee092fe70 a2=94 a3=88 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.473000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.473000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee09318a0 a2=10 a3=f8f00800 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.474000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.474000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee0931740 a2=10 a3=3 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.474000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.474000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.474000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee09316e0 a2=10 a3=3 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.474000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.474000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:52.474000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffee09316e0 a2=10 a3=7 items=0 ppid=2194 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.474000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:25:52.481000 audit: BPF prog-id=100 op=UNLOAD Sep 6 01:25:52.565000 audit[2417]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:25:52.565000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc5e19e890 a2=0 a3=7ffc5e19e87c items=0 ppid=2194 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.565000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:25:52.566000 audit[2418]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:25:52.566000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe88cee740 a2=0 a3=7ffe88cee72c items=0 ppid=2194 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:25:52.570000 audit[2420]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:25:52.570000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc29be74b0 a2=0 a3=7ffc29be749c items=0 ppid=2194 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.570000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:25:52.575000 audit[2416]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:25:52.575000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc1acb19d0 a2=0 a3=7ffc1acb19bc items=0 ppid=2194 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:52.575000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:25:52.996966 systemd[1]: run-containerd-runc-k8s.io-d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc-runc.SVSrEP.mount: Deactivated successfully. Sep 6 01:25:53.060298 kubelet[1505]: E0906 01:25:53.060194 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:54.016686 systemd-networkd[1031]: vxlan.calico: Gained IPv6LL Sep 6 01:25:54.061621 kubelet[1505]: E0906 01:25:54.061401 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:55.062682 kubelet[1505]: E0906 01:25:55.062592 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:55.226191 env[1193]: time="2025-09-06T01:25:55.225887141Z" level=info msg="StopPodSandbox for \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\"" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.319 [INFO][2443] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.320 [INFO][2443] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" iface="eth0" netns="/var/run/netns/cni-371cc3fe-72fd-47f3-414d-575a01fbe4d3" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.322 [INFO][2443] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" iface="eth0" netns="/var/run/netns/cni-371cc3fe-72fd-47f3-414d-575a01fbe4d3" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.323 [INFO][2443] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" iface="eth0" netns="/var/run/netns/cni-371cc3fe-72fd-47f3-414d-575a01fbe4d3" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.323 [INFO][2443] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.323 [INFO][2443] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.418 [INFO][2450] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.418 [INFO][2450] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.419 [INFO][2450] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.433 [WARNING][2450] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.433 [INFO][2450] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.438 [INFO][2450] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:55.443026 env[1193]: 2025-09-06 01:25:55.441 [INFO][2443] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:25:55.447409 systemd[1]: run-netns-cni\x2d371cc3fe\x2d72fd\x2d47f3\x2d414d\x2d575a01fbe4d3.mount: Deactivated successfully. Sep 6 01:25:55.450034 env[1193]: time="2025-09-06T01:25:55.449327263Z" level=info msg="TearDown network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\" successfully" Sep 6 01:25:55.450034 env[1193]: time="2025-09-06T01:25:55.449370864Z" level=info msg="StopPodSandbox for \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\" returns successfully" Sep 6 01:25:55.451998 env[1193]: time="2025-09-06T01:25:55.451942033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bqtnz,Uid:8a839322-0603-41eb-96b8-e1331153712c,Namespace:calico-system,Attempt:1,}" Sep 6 01:25:55.684589 systemd-networkd[1031]: cali6efb2752712: Link UP Sep 6 01:25:55.688723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:25:55.689083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6efb2752712: link becomes ready Sep 6 01:25:55.689407 systemd-networkd[1031]: cali6efb2752712: Gained carrier Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.529 [INFO][2457] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.95.46-k8s-csi--node--driver--bqtnz-eth0 csi-node-driver- calico-system 8a839322-0603-41eb-96b8-e1331153712c 1283 0 2025-09-06 01:25:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.244.95.46 csi-node-driver-bqtnz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6efb2752712 [] [] }} ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.530 [INFO][2457] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.592 [INFO][2469] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" HandleID="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.593 [INFO][2469] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" HandleID="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251610), Attrs:map[string]string{"namespace":"calico-system", "node":"10.244.95.46", "pod":"csi-node-driver-bqtnz", "timestamp":"2025-09-06 01:25:55.592843423 +0000 UTC"}, Hostname:"10.244.95.46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.593 [INFO][2469] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.593 [INFO][2469] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.593 [INFO][2469] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.95.46' Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.609 [INFO][2469] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.628 [INFO][2469] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.635 [INFO][2469] ipam/ipam.go 511: Trying affinity for 192.168.3.128/26 host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.638 [INFO][2469] ipam/ipam.go 158: Attempting to load block cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.643 [INFO][2469] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.643 [INFO][2469] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.647 [INFO][2469] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.654 [INFO][2469] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.663 [INFO][2469] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.3.129/26] block=192.168.3.128/26 handle="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.663 [INFO][2469] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.3.129/26] handle="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" host="10.244.95.46" Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.663 [INFO][2469] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:55.715596 env[1193]: 2025-09-06 01:25:55.663 [INFO][2469] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.129/26] IPv6=[] ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" HandleID="k8s-pod-network.b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.717636 env[1193]: 2025-09-06 01:25:55.666 [INFO][2457] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-csi--node--driver--bqtnz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a839322-0603-41eb-96b8-e1331153712c", ResourceVersion:"1283", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"", Pod:"csi-node-driver-bqtnz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6efb2752712", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:55.717636 env[1193]: 2025-09-06 01:25:55.666 [INFO][2457] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.3.129/32] ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.717636 env[1193]: 2025-09-06 01:25:55.666 [INFO][2457] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6efb2752712 ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.717636 env[1193]: 2025-09-06 01:25:55.690 [INFO][2457] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.717636 env[1193]: 2025-09-06 01:25:55.691 [INFO][2457] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-csi--node--driver--bqtnz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a839322-0603-41eb-96b8-e1331153712c", ResourceVersion:"1283", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab", Pod:"csi-node-driver-bqtnz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6efb2752712", MAC:"7e:a7:b8:26:8f:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:55.717636 env[1193]: 2025-09-06 01:25:55.709 [INFO][2457] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab" Namespace="calico-system" Pod="csi-node-driver-bqtnz" WorkloadEndpoint="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:25:55.733527 env[1193]: time="2025-09-06T01:25:55.733446668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:25:55.733527 env[1193]: time="2025-09-06T01:25:55.733526850Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:25:55.733757 env[1193]: time="2025-09-06T01:25:55.733556486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:25:55.733757 env[1193]: time="2025-09-06T01:25:55.733686198Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab pid=2495 runtime=io.containerd.runc.v2 Sep 6 01:25:55.758080 systemd[1]: Started cri-containerd-b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab.scope. Sep 6 01:25:55.776027 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 6 01:25:55.776152 kernel: audit: type=1400 audit(1757121955.773:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.778133 kernel: audit: type=1400 audit(1757121955.773:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783269 kernel: audit: type=1400 audit(1757121955.773:672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.787148 kernel: audit: type=1400 audit(1757121955.773:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.787209 kernel: audit: type=1400 audit(1757121955.773:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.805712 kernel: audit: type=1400 audit(1757121955.773:675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.805776 kernel: audit: type=1400 audit(1757121955.773:676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.809172 kernel: audit: type=1400 audit(1757121955.773:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.809240 kernel: audit: type=1400 audit(1757121955.773:678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.814411 kernel: audit: type=1400 audit(1757121955.775:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.775000 audit: BPF prog-id=106 op=LOAD Sep 6 01:25:55.748000 audit[2505]: NETFILTER_CFG table=filter:71 family=2 entries=38 op=nft_register_chain pid=2505 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:25:55.748000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffc2ca039e0 a2=0 a3=7ffc2ca039cc items=0 ppid=2194 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:55.748000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:55.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623462356162386361613036636261303539353664336366383433 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:55.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623462356162386361613036636261303539353664336366383433 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit: BPF prog-id=107 op=LOAD Sep 6 01:25:55.783000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001856d0 items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:55.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623462356162386361613036636261303539353664336366383433 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit: BPF prog-id=108 op=LOAD Sep 6 01:25:55.783000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185718 items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:55.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623462356162386361613036636261303539353664336366383433 Sep 6 01:25:55.783000 audit: BPF prog-id=108 op=UNLOAD Sep 6 01:25:55.783000 audit: BPF prog-id=107 op=UNLOAD Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:55.783000 audit: BPF prog-id=109 op=LOAD Sep 6 01:25:55.783000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185b28 items=0 ppid=2495 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:55.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623462356162386361613036636261303539353664336366383433 Sep 6 01:25:55.819719 env[1193]: time="2025-09-06T01:25:55.819682932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bqtnz,Uid:8a839322-0603-41eb-96b8-e1331153712c,Namespace:calico-system,Attempt:1,} returns sandbox id \"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab\"" Sep 6 01:25:55.822023 env[1193]: time="2025-09-06T01:25:55.821999613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 01:25:56.064587 kubelet[1505]: E0906 01:25:56.064324 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:56.449773 systemd[1]: run-containerd-runc-k8s.io-b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab-runc.7XbD4s.mount: Deactivated successfully. Sep 6 01:25:57.065602 kubelet[1505]: E0906 01:25:57.065533 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:57.297841 env[1193]: time="2025-09-06T01:25:57.297705793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:57.301377 env[1193]: time="2025-09-06T01:25:57.301297679Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:57.303596 env[1193]: time="2025-09-06T01:25:57.303539613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:57.314319 env[1193]: time="2025-09-06T01:25:57.314098512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:57.316576 env[1193]: time="2025-09-06T01:25:57.315009170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 01:25:57.320562 env[1193]: time="2025-09-06T01:25:57.320493586Z" level=info msg="CreateContainer within sandbox \"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 01:25:57.335080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1584167007.mount: Deactivated successfully. Sep 6 01:25:57.340278 env[1193]: time="2025-09-06T01:25:57.340204833Z" level=info msg="CreateContainer within sandbox \"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"961c552a37162d5da90376e90e7ce9886a969b014238c48d34131bf7dbe8ad45\"" Sep 6 01:25:57.343732 env[1193]: time="2025-09-06T01:25:57.343702379Z" level=info msg="StartContainer for \"961c552a37162d5da90376e90e7ce9886a969b014238c48d34131bf7dbe8ad45\"" Sep 6 01:25:57.353322 systemd-networkd[1031]: cali6efb2752712: Gained IPv6LL Sep 6 01:25:57.380360 systemd[1]: Started cri-containerd-961c552a37162d5da90376e90e7ce9886a969b014238c48d34131bf7dbe8ad45.scope. Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7364eb0138 items=0 ppid=2495 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:57.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316335353261333731363264356461393033373665393065376365 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.413000 audit: BPF prog-id=110 op=LOAD Sep 6 01:25:57.413000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000378748 items=0 ppid=2495 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:57.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316335353261333731363264356461393033373665393065376365 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.414000 audit: BPF prog-id=111 op=LOAD Sep 6 01:25:57.414000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000378798 items=0 ppid=2495 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:57.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316335353261333731363264356461393033373665393065376365 Sep 6 01:25:57.415000 audit: BPF prog-id=111 op=UNLOAD Sep 6 01:25:57.415000 audit: BPF prog-id=110 op=UNLOAD Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:57.415000 audit: BPF prog-id=112 op=LOAD Sep 6 01:25:57.415000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000378828 items=0 ppid=2495 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:57.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316335353261333731363264356461393033373665393065376365 Sep 6 01:25:57.447566 env[1193]: time="2025-09-06T01:25:57.443029282Z" level=info msg="StartContainer for \"961c552a37162d5da90376e90e7ce9886a969b014238c48d34131bf7dbe8ad45\" returns successfully" Sep 6 01:25:57.447566 env[1193]: time="2025-09-06T01:25:57.446862537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 01:25:57.446621 systemd[1]: run-containerd-runc-k8s.io-961c552a37162d5da90376e90e7ce9886a969b014238c48d34131bf7dbe8ad45-runc.Jbk8h9.mount: Deactivated successfully. Sep 6 01:25:58.066470 kubelet[1505]: E0906 01:25:58.066354 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:59.067677 kubelet[1505]: E0906 01:25:59.067550 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:59.227150 env[1193]: time="2025-09-06T01:25:59.227080833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:59.229615 env[1193]: time="2025-09-06T01:25:59.229541912Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:59.231992 env[1193]: time="2025-09-06T01:25:59.231936406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:59.233942 env[1193]: time="2025-09-06T01:25:59.233916338Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:59.234715 env[1193]: time="2025-09-06T01:25:59.234686134Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 01:25:59.238738 env[1193]: time="2025-09-06T01:25:59.238709206Z" level=info msg="CreateContainer within sandbox \"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 01:25:59.250881 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount687314124.mount: Deactivated successfully. Sep 6 01:25:59.255668 env[1193]: time="2025-09-06T01:25:59.255627790Z" level=info msg="CreateContainer within sandbox \"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ed7f3884697a481adc8624438fdfe63498d91ed745d577737a553dd3859b9f1a\"" Sep 6 01:25:59.256506 env[1193]: time="2025-09-06T01:25:59.256481757Z" level=info msg="StartContainer for \"ed7f3884697a481adc8624438fdfe63498d91ed745d577737a553dd3859b9f1a\"" Sep 6 01:25:59.282454 systemd[1]: Started cri-containerd-ed7f3884697a481adc8624438fdfe63498d91ed745d577737a553dd3859b9f1a.scope. Sep 6 01:25:59.313000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.313000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ffab91664d8 items=0 ppid=2495 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:59.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376633383834363937613438316164633836323434333866646665 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.314000 audit: BPF prog-id=113 op=LOAD Sep 6 01:25:59.314000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000218c98 items=0 ppid=2495 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:59.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376633383834363937613438316164633836323434333866646665 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.315000 audit: BPF prog-id=114 op=LOAD Sep 6 01:25:59.315000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000218ce8 items=0 ppid=2495 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:59.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376633383834363937613438316164633836323434333866646665 Sep 6 01:25:59.315000 audit: BPF prog-id=114 op=UNLOAD Sep 6 01:25:59.316000 audit: BPF prog-id=113 op=UNLOAD Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:59.316000 audit: BPF prog-id=115 op=LOAD Sep 6 01:25:59.316000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000218d78 items=0 ppid=2495 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:59.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376633383834363937613438316164633836323434333866646665 Sep 6 01:25:59.336362 env[1193]: time="2025-09-06T01:25:59.336250422Z" level=info msg="StartContainer for \"ed7f3884697a481adc8624438fdfe63498d91ed745d577737a553dd3859b9f1a\" returns successfully" Sep 6 01:25:59.408554 kubelet[1505]: I0906 01:25:59.408423 1505 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bqtnz" podStartSLOduration=29.992883294 podStartE2EDuration="33.408301943s" podCreationTimestamp="2025-09-06 01:25:26 +0000 UTC" firstStartedPulling="2025-09-06 01:25:55.821384698 +0000 UTC m=+30.170792994" lastFinishedPulling="2025-09-06 01:25:59.236803351 +0000 UTC m=+33.586211643" observedRunningTime="2025-09-06 01:25:59.401568676 +0000 UTC m=+33.750976988" watchObservedRunningTime="2025-09-06 01:25:59.408301943 +0000 UTC m=+33.757710322" Sep 6 01:26:00.068669 kubelet[1505]: E0906 01:26:00.068574 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:00.161488 kubelet[1505]: I0906 01:26:00.161332 1505 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 01:26:00.161488 kubelet[1505]: I0906 01:26:00.161419 1505 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 01:26:01.069239 kubelet[1505]: E0906 01:26:01.069161 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:01.224581 env[1193]: time="2025-09-06T01:26:01.223637430Z" level=info msg="StopPodSandbox for \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\"" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.297 [INFO][2624] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.298 [INFO][2624] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" iface="eth0" netns="/var/run/netns/cni-4d884b76-1be1-fa09-57f4-951d62081396" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.299 [INFO][2624] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" iface="eth0" netns="/var/run/netns/cni-4d884b76-1be1-fa09-57f4-951d62081396" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.301 [INFO][2624] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" iface="eth0" netns="/var/run/netns/cni-4d884b76-1be1-fa09-57f4-951d62081396" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.301 [INFO][2624] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.301 [INFO][2624] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.335 [INFO][2631] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.335 [INFO][2631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.335 [INFO][2631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.352 [WARNING][2631] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.352 [INFO][2631] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.354 [INFO][2631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:01.360151 env[1193]: 2025-09-06 01:26:01.357 [INFO][2624] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:01.364711 systemd[1]: run-netns-cni\x2d4d884b76\x2d1be1\x2dfa09\x2d57f4\x2d951d62081396.mount: Deactivated successfully. Sep 6 01:26:01.366680 env[1193]: time="2025-09-06T01:26:01.366531063Z" level=info msg="TearDown network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\" successfully" Sep 6 01:26:01.366680 env[1193]: time="2025-09-06T01:26:01.366603130Z" level=info msg="StopPodSandbox for \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\" returns successfully" Sep 6 01:26:01.367637 env[1193]: time="2025-09-06T01:26:01.367608458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-tt8xs,Uid:72d07216-0545-4aac-84bc-343a7d59cef5,Namespace:default,Attempt:1,}" Sep 6 01:26:01.617416 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:26:01.617634 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali21636e38bd8: link becomes ready Sep 6 01:26:01.618381 systemd-networkd[1031]: cali21636e38bd8: Link UP Sep 6 01:26:01.618556 systemd-networkd[1031]: cali21636e38bd8: Gained carrier Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.437 [INFO][2637] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0 nginx-deployment-8587fbcb89- default 72d07216-0545-4aac-84bc-343a7d59cef5 1314 0 2025-09-06 01:25:46 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.95.46 nginx-deployment-8587fbcb89-tt8xs eth0 default [] [] [kns.default ksa.default.default] cali21636e38bd8 [] [] }} ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.438 [INFO][2637] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.490 [INFO][2650] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" HandleID="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.491 [INFO][2650] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" HandleID="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d56b0), Attrs:map[string]string{"namespace":"default", "node":"10.244.95.46", "pod":"nginx-deployment-8587fbcb89-tt8xs", "timestamp":"2025-09-06 01:26:01.490564856 +0000 UTC"}, Hostname:"10.244.95.46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.491 [INFO][2650] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.491 [INFO][2650] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.491 [INFO][2650] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.95.46' Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.508 [INFO][2650] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.520 [INFO][2650] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.530 [INFO][2650] ipam/ipam.go 511: Trying affinity for 192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.534 [INFO][2650] ipam/ipam.go 158: Attempting to load block cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.539 [INFO][2650] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.539 [INFO][2650] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.542 [INFO][2650] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.572 [INFO][2650] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.589 [INFO][2650] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.3.130/26] block=192.168.3.128/26 handle="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.589 [INFO][2650] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.3.130/26] handle="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" host="10.244.95.46" Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.590 [INFO][2650] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:01.634609 env[1193]: 2025-09-06 01:26:01.590 [INFO][2650] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.130/26] IPv6=[] ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" HandleID="k8s-pod-network.e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.635503 env[1193]: 2025-09-06 01:26:01.594 [INFO][2637] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"72d07216-0545-4aac-84bc-343a7d59cef5", ResourceVersion:"1314", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-tt8xs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali21636e38bd8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:01.635503 env[1193]: 2025-09-06 01:26:01.594 [INFO][2637] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.3.130/32] ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.635503 env[1193]: 2025-09-06 01:26:01.594 [INFO][2637] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali21636e38bd8 ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.635503 env[1193]: 2025-09-06 01:26:01.620 [INFO][2637] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.635503 env[1193]: 2025-09-06 01:26:01.621 [INFO][2637] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"72d07216-0545-4aac-84bc-343a7d59cef5", ResourceVersion:"1314", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c", Pod:"nginx-deployment-8587fbcb89-tt8xs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali21636e38bd8", MAC:"86:a7:7e:a2:c0:77", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:01.635503 env[1193]: 2025-09-06 01:26:01.633 [INFO][2637] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c" Namespace="default" Pod="nginx-deployment-8587fbcb89-tt8xs" WorkloadEndpoint="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:01.659218 kernel: kauditd_printk_skb: 136 callbacks suppressed Sep 6 01:26:01.659347 kernel: audit: type=1325 audit(1757121961.650:701): table=filter:72 family=2 entries=42 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:26:01.659392 kernel: audit: type=1300 audit(1757121961.650:701): arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffd285f09d0 a2=0 a3=7ffd285f09bc items=0 ppid=2194 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:01.650000 audit[2672]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:26:01.650000 audit[2672]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffd285f09d0 a2=0 a3=7ffd285f09bc items=0 ppid=2194 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:01.650000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:26:01.664158 kernel: audit: type=1327 audit(1757121961.650:701): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:26:01.664273 env[1193]: time="2025-09-06T01:26:01.664217824Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:26:01.664376 env[1193]: time="2025-09-06T01:26:01.664257052Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:26:01.664376 env[1193]: time="2025-09-06T01:26:01.664269493Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:26:01.664574 env[1193]: time="2025-09-06T01:26:01.664547946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c pid=2675 runtime=io.containerd.runc.v2 Sep 6 01:26:01.679549 systemd[1]: Started cri-containerd-e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c.scope. Sep 6 01:26:01.704415 kernel: audit: type=1400 audit(1757121961.697:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704516 kernel: audit: type=1400 audit(1757121961.697:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.709134 kernel: audit: type=1400 audit(1757121961.697:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.713132 kernel: audit: type=1400 audit(1757121961.697:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.722946 kernel: audit: type=1400 audit(1757121961.697:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.723007 kernel: audit: type=1400 audit(1757121961.697:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.723034 kernel: audit: type=1400 audit(1757121961.697:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit: BPF prog-id=116 op=LOAD Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2675 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:01.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537353830353764616636623031316635366135323231383363346631 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2675 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:01.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537353830353764616636623031316635366135323231383363346631 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.703000 audit: BPF prog-id=117 op=LOAD Sep 6 01:26:01.703000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e7f90 items=0 ppid=2675 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:01.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537353830353764616636623031316635366135323231383363346631 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit: BPF prog-id=118 op=LOAD Sep 6 01:26:01.704000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e7fd8 items=0 ppid=2675 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:01.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537353830353764616636623031316635366135323231383363346631 Sep 6 01:26:01.704000 audit: BPF prog-id=118 op=UNLOAD Sep 6 01:26:01.704000 audit: BPF prog-id=117 op=UNLOAD Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:01.704000 audit: BPF prog-id=119 op=LOAD Sep 6 01:26:01.704000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e63e8 items=0 ppid=2675 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:01.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537353830353764616636623031316635366135323231383363346631 Sep 6 01:26:01.749344 env[1193]: time="2025-09-06T01:26:01.749271981Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-tt8xs,Uid:72d07216-0545-4aac-84bc-343a7d59cef5,Namespace:default,Attempt:1,} returns sandbox id \"e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c\"" Sep 6 01:26:01.753335 env[1193]: time="2025-09-06T01:26:01.753304828Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 01:26:01.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.46:22-221.213.129.46:60868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:01.799699 systemd[1]: Started sshd@9-10.244.95.46:22-221.213.129.46:60868.service. Sep 6 01:26:02.071059 kubelet[1505]: E0906 01:26:02.070858 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:02.367233 systemd[1]: run-containerd-runc-k8s.io-e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c-runc.oxEpqw.mount: Deactivated successfully. Sep 6 01:26:03.011681 sshd[2709]: Invalid user labex from 221.213.129.46 port 60868 Sep 6 01:26:03.018745 sshd[2709]: pam_faillock(sshd:auth): User unknown Sep 6 01:26:03.021859 sshd[2709]: pam_unix(sshd:auth): check pass; user unknown Sep 6 01:26:03.022316 sshd[2709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.213.129.46 Sep 6 01:26:03.023616 sshd[2709]: pam_faillock(sshd:auth): User unknown Sep 6 01:26:03.022000 audit[2709]: USER_AUTH pid=2709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="labex" exe="/usr/sbin/sshd" hostname=221.213.129.46 addr=221.213.129.46 terminal=ssh res=failed' Sep 6 01:26:03.071477 kubelet[1505]: E0906 01:26:03.071409 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:03.553764 systemd-networkd[1031]: cali21636e38bd8: Gained IPv6LL Sep 6 01:26:04.072478 kubelet[1505]: E0906 01:26:04.072352 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:05.075375 kubelet[1505]: E0906 01:26:05.075270 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:05.331840 sshd[2709]: Failed password for invalid user labex from 221.213.129.46 port 60868 ssh2 Sep 6 01:26:05.467068 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2446441799.mount: Deactivated successfully. Sep 6 01:26:05.820626 sshd[2709]: Received disconnect from 221.213.129.46 port 60868:11: Bye Bye [preauth] Sep 6 01:26:05.820626 sshd[2709]: Disconnected from invalid user labex 221.213.129.46 port 60868 [preauth] Sep 6 01:26:05.823621 systemd[1]: sshd@9-10.244.95.46:22-221.213.129.46:60868.service: Deactivated successfully. Sep 6 01:26:05.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.46:22-221.213.129.46:60868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:06.028060 kubelet[1505]: E0906 01:26:06.027955 1505 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:06.076565 kubelet[1505]: E0906 01:26:06.076046 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:07.077341 kubelet[1505]: E0906 01:26:07.077237 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:07.464601 env[1193]: time="2025-09-06T01:26:07.464529735Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:07.466186 env[1193]: time="2025-09-06T01:26:07.466082950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:07.468669 env[1193]: time="2025-09-06T01:26:07.468631213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:07.471936 env[1193]: time="2025-09-06T01:26:07.471910254Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:07.472766 env[1193]: time="2025-09-06T01:26:07.472738266Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 01:26:07.475940 env[1193]: time="2025-09-06T01:26:07.475900973Z" level=info msg="CreateContainer within sandbox \"e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 6 01:26:07.484101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount419929244.mount: Deactivated successfully. Sep 6 01:26:07.489721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2406626643.mount: Deactivated successfully. Sep 6 01:26:07.493152 env[1193]: time="2025-09-06T01:26:07.493078948Z" level=info msg="CreateContainer within sandbox \"e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5e7e43aa503b9d3599a87ecd5b9beafb08c81bf9b248fe43555eabc0f1cbed7c\"" Sep 6 01:26:07.493740 env[1193]: time="2025-09-06T01:26:07.493670999Z" level=info msg="StartContainer for \"5e7e43aa503b9d3599a87ecd5b9beafb08c81bf9b248fe43555eabc0f1cbed7c\"" Sep 6 01:26:07.516361 systemd[1]: Started cri-containerd-5e7e43aa503b9d3599a87ecd5b9beafb08c81bf9b248fe43555eabc0f1cbed7c.scope. Sep 6 01:26:07.542184 kernel: kauditd_printk_skb: 53 callbacks suppressed Sep 6 01:26:07.542335 kernel: audit: type=1400 audit(1757121967.538:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.547139 kernel: audit: type=1400 audit(1757121967.538:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.551187 kernel: audit: type=1400 audit(1757121967.538:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.554219 kernel: audit: type=1400 audit(1757121967.538:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.554290 kernel: audit: type=1400 audit(1757121967.538:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.559811 kernel: audit: type=1400 audit(1757121967.538:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.564177 kernel: audit: type=1400 audit(1757121967.538:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.568126 kernel: audit: type=1400 audit(1757121967.538:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.573986 kernel: audit: type=1400 audit(1757121967.538:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.574080 kernel: audit: type=1400 audit(1757121967.540:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.540000 audit: BPF prog-id=120 op=LOAD Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2675 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:07.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376534336161353033623964333539396138376563643562396265 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2675 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:07.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376534336161353033623964333539396138376563643562396265 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.543000 audit: BPF prog-id=121 op=LOAD Sep 6 01:26:07.543000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003980b0 items=0 ppid=2675 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:07.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376534336161353033623964333539396138376563643562396265 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit: BPF prog-id=122 op=LOAD Sep 6 01:26:07.545000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003980f8 items=0 ppid=2675 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:07.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376534336161353033623964333539396138376563643562396265 Sep 6 01:26:07.545000 audit: BPF prog-id=122 op=UNLOAD Sep 6 01:26:07.545000 audit: BPF prog-id=121 op=UNLOAD Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:07.545000 audit: BPF prog-id=123 op=LOAD Sep 6 01:26:07.545000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000398508 items=0 ppid=2675 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:07.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376534336161353033623964333539396138376563643562396265 Sep 6 01:26:07.581602 env[1193]: time="2025-09-06T01:26:07.581564902Z" level=info msg="StartContainer for \"5e7e43aa503b9d3599a87ecd5b9beafb08c81bf9b248fe43555eabc0f1cbed7c\" returns successfully" Sep 6 01:26:08.079154 kubelet[1505]: E0906 01:26:08.079031 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:09.079659 kubelet[1505]: E0906 01:26:09.079554 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:10.080353 kubelet[1505]: E0906 01:26:10.080262 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:11.080847 kubelet[1505]: E0906 01:26:11.080708 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:12.082047 kubelet[1505]: E0906 01:26:12.081953 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:13.082582 kubelet[1505]: E0906 01:26:13.082478 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:14.083649 kubelet[1505]: E0906 01:26:14.083517 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:15.084685 kubelet[1505]: E0906 01:26:15.084593 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:16.085397 kubelet[1505]: E0906 01:26:16.085291 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:17.086179 kubelet[1505]: E0906 01:26:17.086082 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:18.088614 kubelet[1505]: E0906 01:26:18.088139 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:18.466000 audit[2790]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.472529 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 6 01:26:18.472655 kernel: audit: type=1325 audit(1757121978.466:741): table=filter:73 family=2 entries=20 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.466000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc40dfcd30 a2=0 a3=7ffc40dfcd1c items=0 ppid=1670 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.479150 kernel: audit: type=1300 audit(1757121978.466:741): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc40dfcd30 a2=0 a3=7ffc40dfcd1c items=0 ppid=1670 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.479248 kernel: audit: type=1327 audit(1757121978.466:741): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.478000 audit[2790]: NETFILTER_CFG table=nat:74 family=2 entries=26 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.483599 kernel: audit: type=1325 audit(1757121978.478:742): table=nat:74 family=2 entries=26 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.483649 kernel: audit: type=1300 audit(1757121978.478:742): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc40dfcd30 a2=0 a3=0 items=0 ppid=1670 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.478000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc40dfcd30 a2=0 a3=0 items=0 ppid=1670 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.489927 kernel: audit: type=1327 audit(1757121978.478:742): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.635000 audit[2792]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.635000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe04d141c0 a2=0 a3=7ffe04d141ac items=0 ppid=1670 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.643288 kernel: audit: type=1325 audit(1757121978.635:743): table=filter:75 family=2 entries=32 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.643385 kernel: audit: type=1300 audit(1757121978.635:743): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe04d141c0 a2=0 a3=7ffe04d141ac items=0 ppid=1670 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.645704 kernel: audit: type=1327 audit(1757121978.635:743): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.649000 audit[2792]: NETFILTER_CFG table=nat:76 family=2 entries=26 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.649000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe04d141c0 a2=0 a3=0 items=0 ppid=1670 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.654154 kernel: audit: type=1325 audit(1757121978.649:744): table=nat:76 family=2 entries=26 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:19.089582 kubelet[1505]: E0906 01:26:19.089442 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:19.168832 kubelet[1505]: I0906 01:26:19.168664 1505 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-tt8xs" podStartSLOduration=27.446860553 podStartE2EDuration="33.168601975s" podCreationTimestamp="2025-09-06 01:25:46 +0000 UTC" firstStartedPulling="2025-09-06 01:26:01.752475541 +0000 UTC m=+36.101883855" lastFinishedPulling="2025-09-06 01:26:07.474216973 +0000 UTC m=+41.823625277" observedRunningTime="2025-09-06 01:26:08.439453857 +0000 UTC m=+42.788862203" watchObservedRunningTime="2025-09-06 01:26:19.168601975 +0000 UTC m=+53.518010388" Sep 6 01:26:19.182435 systemd[1]: Created slice kubepods-besteffort-podc59b6dad_50e9_439a_b0d9_094791ad938c.slice. Sep 6 01:26:19.192505 kubelet[1505]: I0906 01:26:19.192314 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c59b6dad-50e9-439a-b0d9-094791ad938c-data\") pod \"nfs-server-provisioner-0\" (UID: \"c59b6dad-50e9-439a-b0d9-094791ad938c\") " pod="default/nfs-server-provisioner-0" Sep 6 01:26:19.192764 kubelet[1505]: I0906 01:26:19.192555 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rml6r\" (UniqueName: \"kubernetes.io/projected/c59b6dad-50e9-439a-b0d9-094791ad938c-kube-api-access-rml6r\") pod \"nfs-server-provisioner-0\" (UID: \"c59b6dad-50e9-439a-b0d9-094791ad938c\") " pod="default/nfs-server-provisioner-0" Sep 6 01:26:19.488155 env[1193]: time="2025-09-06T01:26:19.487956741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c59b6dad-50e9-439a-b0d9-094791ad938c,Namespace:default,Attempt:0,}" Sep 6 01:26:19.745218 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:26:19.746531 systemd-networkd[1031]: cali60e51b789ff: Link UP Sep 6 01:26:19.750620 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 6 01:26:19.751501 systemd-networkd[1031]: cali60e51b789ff: Gained carrier Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.582 [INFO][2795] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.95.46-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c59b6dad-50e9-439a-b0d9-094791ad938c 1376 0 2025-09-06 01:26:18 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.244.95.46 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.582 [INFO][2795] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.631 [INFO][2808] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" HandleID="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Workload="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.631 [INFO][2808] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" HandleID="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Workload="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"default", "node":"10.244.95.46", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-06 01:26:19.631388647 +0000 UTC"}, Hostname:"10.244.95.46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.631 [INFO][2808] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.631 [INFO][2808] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.632 [INFO][2808] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.95.46' Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.657 [INFO][2808] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.673 [INFO][2808] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.687 [INFO][2808] ipam/ipam.go 511: Trying affinity for 192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.691 [INFO][2808] ipam/ipam.go 158: Attempting to load block cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.695 [INFO][2808] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.696 [INFO][2808] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.701 [INFO][2808] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.714 [INFO][2808] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.725 [INFO][2808] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.3.131/26] block=192.168.3.128/26 handle="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.725 [INFO][2808] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.3.131/26] handle="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" host="10.244.95.46" Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.725 [INFO][2808] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:19.780298 env[1193]: 2025-09-06 01:26:19.725 [INFO][2808] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.131/26] IPv6=[] ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" HandleID="k8s-pod-network.2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Workload="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:26:19.781578 env[1193]: 2025-09-06 01:26:19.730 [INFO][2795] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c59b6dad-50e9-439a-b0d9-094791ad938c", ResourceVersion:"1376", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 26, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.3.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:19.781578 env[1193]: 2025-09-06 01:26:19.730 [INFO][2795] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.3.131/32] ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:26:19.781578 env[1193]: 2025-09-06 01:26:19.730 [INFO][2795] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:26:19.781578 env[1193]: 2025-09-06 01:26:19.756 [INFO][2795] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:26:19.781898 env[1193]: 2025-09-06 01:26:19.757 [INFO][2795] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c59b6dad-50e9-439a-b0d9-094791ad938c", ResourceVersion:"1376", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 26, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.3.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"6a:e1:06:44:c7:53", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:19.781898 env[1193]: 2025-09-06 01:26:19.775 [INFO][2795] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.95.46-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:26:19.800464 env[1193]: time="2025-09-06T01:26:19.800374082Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:26:19.800646 env[1193]: time="2025-09-06T01:26:19.800438934Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:26:19.800646 env[1193]: time="2025-09-06T01:26:19.800452215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:26:19.801000 audit[2834]: NETFILTER_CFG table=filter:77 family=2 entries=46 op=nft_register_chain pid=2834 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:26:19.801000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7fff8505de10 a2=0 a3=7fff8505ddfc items=0 ppid=2194 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:19.801000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:26:19.808097 env[1193]: time="2025-09-06T01:26:19.808038244Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca pid=2832 runtime=io.containerd.runc.v2 Sep 6 01:26:19.831497 systemd[1]: Started cri-containerd-2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca.scope. Sep 6 01:26:19.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.865000 audit: BPF prog-id=124 op=LOAD Sep 6 01:26:19.866000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.866000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2832 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:19.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386566313163363638313734656531363633363531353236646435 Sep 6 01:26:19.866000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.866000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2832 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:19.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386566313163363638313734656531363633363531353236646435 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.867000 audit: BPF prog-id=125 op=LOAD Sep 6 01:26:19.867000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000310530 items=0 ppid=2832 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:19.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386566313163363638313734656531363633363531353236646435 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.868000 audit: BPF prog-id=126 op=LOAD Sep 6 01:26:19.868000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000310578 items=0 ppid=2832 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:19.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386566313163363638313734656531363633363531353236646435 Sep 6 01:26:19.868000 audit: BPF prog-id=126 op=UNLOAD Sep 6 01:26:19.868000 audit: BPF prog-id=125 op=UNLOAD Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:19.869000 audit: BPF prog-id=127 op=LOAD Sep 6 01:26:19.869000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000310988 items=0 ppid=2832 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:19.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263386566313163363638313734656531363633363531353236646435 Sep 6 01:26:19.909335 env[1193]: time="2025-09-06T01:26:19.909256577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c59b6dad-50e9-439a-b0d9-094791ad938c,Namespace:default,Attempt:0,} returns sandbox id \"2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca\"" Sep 6 01:26:19.911761 env[1193]: time="2025-09-06T01:26:19.911732361Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 6 01:26:20.094251 kubelet[1505]: E0906 01:26:20.089854 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:21.091153 kubelet[1505]: E0906 01:26:21.091045 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:21.600741 systemd-networkd[1031]: cali60e51b789ff: Gained IPv6LL Sep 6 01:26:22.008133 systemd[1]: run-containerd-runc-k8s.io-d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc-runc.sCr8a7.mount: Deactivated successfully. Sep 6 01:26:22.093177 kubelet[1505]: E0906 01:26:22.093086 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:23.094928 kubelet[1505]: E0906 01:26:23.094696 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:24.095563 kubelet[1505]: E0906 01:26:24.095374 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:25.095750 kubelet[1505]: E0906 01:26:25.095679 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:26.029069 kubelet[1505]: E0906 01:26:26.028965 1505 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:26.079073 env[1193]: time="2025-09-06T01:26:26.078985537Z" level=info msg="StopPodSandbox for \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\"" Sep 6 01:26:26.096594 kubelet[1505]: E0906 01:26:26.096544 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:26.130845 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1744058760.mount: Deactivated successfully. Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.158 [WARNING][2899] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-csi--node--driver--bqtnz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a839322-0603-41eb-96b8-e1331153712c", ResourceVersion:"1304", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab", Pod:"csi-node-driver-bqtnz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6efb2752712", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.158 [INFO][2899] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.158 [INFO][2899] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" iface="eth0" netns="" Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.158 [INFO][2899] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.158 [INFO][2899] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.229 [INFO][2906] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.230 [INFO][2906] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.234 [INFO][2906] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.252 [WARNING][2906] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.252 [INFO][2906] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.255 [INFO][2906] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:26.258551 env[1193]: 2025-09-06 01:26:26.257 [INFO][2899] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.259474 env[1193]: time="2025-09-06T01:26:26.258575650Z" level=info msg="TearDown network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\" successfully" Sep 6 01:26:26.259474 env[1193]: time="2025-09-06T01:26:26.258605676Z" level=info msg="StopPodSandbox for \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\" returns successfully" Sep 6 01:26:26.259474 env[1193]: time="2025-09-06T01:26:26.259370532Z" level=info msg="RemovePodSandbox for \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\"" Sep 6 01:26:26.259474 env[1193]: time="2025-09-06T01:26:26.259403875Z" level=info msg="Forcibly stopping sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\"" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.389 [WARNING][2923] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-csi--node--driver--bqtnz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a839322-0603-41eb-96b8-e1331153712c", ResourceVersion:"1304", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"b5b4b5ab8caa06cba05956d3cf843c71a8319a16daf9f7b392c81089a86c3aab", Pod:"csi-node-driver-bqtnz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6efb2752712", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.390 [INFO][2923] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.390 [INFO][2923] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" iface="eth0" netns="" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.390 [INFO][2923] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.390 [INFO][2923] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.429 [INFO][2930] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.429 [INFO][2930] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.429 [INFO][2930] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.439 [WARNING][2930] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.439 [INFO][2930] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" HandleID="k8s-pod-network.40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Workload="10.244.95.46-k8s-csi--node--driver--bqtnz-eth0" Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.442 [INFO][2930] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:26.448453 env[1193]: 2025-09-06 01:26:26.445 [INFO][2923] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c" Sep 6 01:26:26.449904 env[1193]: time="2025-09-06T01:26:26.449830382Z" level=info msg="TearDown network for sandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\" successfully" Sep 6 01:26:26.453550 env[1193]: time="2025-09-06T01:26:26.453489291Z" level=info msg="RemovePodSandbox \"40531ab677a2e3f4c3f828c65ac969d09d7a85571dbe0afc1e7ae60a7a1c1a9c\" returns successfully" Sep 6 01:26:26.454574 env[1193]: time="2025-09-06T01:26:26.454536232Z" level=info msg="StopPodSandbox for \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\"" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.525 [WARNING][2945] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"72d07216-0545-4aac-84bc-343a7d59cef5", ResourceVersion:"1335", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c", Pod:"nginx-deployment-8587fbcb89-tt8xs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali21636e38bd8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.525 [INFO][2945] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.525 [INFO][2945] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" iface="eth0" netns="" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.525 [INFO][2945] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.525 [INFO][2945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.563 [INFO][2953] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.563 [INFO][2953] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.563 [INFO][2953] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.572 [WARNING][2953] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.572 [INFO][2953] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.574 [INFO][2953] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:26.580282 env[1193]: 2025-09-06 01:26:26.577 [INFO][2945] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.582190 env[1193]: time="2025-09-06T01:26:26.582031666Z" level=info msg="TearDown network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\" successfully" Sep 6 01:26:26.582502 env[1193]: time="2025-09-06T01:26:26.582448868Z" level=info msg="StopPodSandbox for \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\" returns successfully" Sep 6 01:26:26.583511 env[1193]: time="2025-09-06T01:26:26.583450893Z" level=info msg="RemovePodSandbox for \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\"" Sep 6 01:26:26.584186 env[1193]: time="2025-09-06T01:26:26.583788133Z" level=info msg="Forcibly stopping sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\"" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.640 [WARNING][2968] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"72d07216-0545-4aac-84bc-343a7d59cef5", ResourceVersion:"1335", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 25, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"e758057daf6b011f56a522183c4f1a5d0fbf0de392bc58a6628aab09755e6b9c", Pod:"nginx-deployment-8587fbcb89-tt8xs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali21636e38bd8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.641 [INFO][2968] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.641 [INFO][2968] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" iface="eth0" netns="" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.641 [INFO][2968] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.641 [INFO][2968] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.677 [INFO][2975] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.678 [INFO][2975] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.678 [INFO][2975] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.695 [WARNING][2975] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.695 [INFO][2975] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" HandleID="k8s-pod-network.9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Workload="10.244.95.46-k8s-nginx--deployment--8587fbcb89--tt8xs-eth0" Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.701 [INFO][2975] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:26.704290 env[1193]: 2025-09-06 01:26:26.702 [INFO][2968] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79" Sep 6 01:26:26.705945 env[1193]: time="2025-09-06T01:26:26.704262167Z" level=info msg="TearDown network for sandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\" successfully" Sep 6 01:26:26.708150 env[1193]: time="2025-09-06T01:26:26.708084870Z" level=info msg="RemovePodSandbox \"9de3fc3fba4f7e21b10b3b93c8eb8523d07a04e883337a06e41e2713aab32f79\" returns successfully" Sep 6 01:26:27.097043 kubelet[1505]: E0906 01:26:27.096906 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:28.097889 kubelet[1505]: E0906 01:26:28.097800 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:28.538523 env[1193]: time="2025-09-06T01:26:28.538437818Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:28.541627 env[1193]: time="2025-09-06T01:26:28.541562162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:28.545861 env[1193]: time="2025-09-06T01:26:28.545800699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:28.549795 env[1193]: time="2025-09-06T01:26:28.549737052Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:28.551387 env[1193]: time="2025-09-06T01:26:28.551331318Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 6 01:26:28.556023 env[1193]: time="2025-09-06T01:26:28.555989032Z" level=info msg="CreateContainer within sandbox \"2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 6 01:26:28.566078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount181642220.mount: Deactivated successfully. Sep 6 01:26:28.573649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount777409936.mount: Deactivated successfully. Sep 6 01:26:28.578736 env[1193]: time="2025-09-06T01:26:28.578665585Z" level=info msg="CreateContainer within sandbox \"2c8ef11c668174ee1663651526dd587c9dc28e918fc60a0d7df0e595a2e236ca\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0996ceddffddc67d3a140bf368baab686ca186e27bf33ea723d4810132939d46\"" Sep 6 01:26:28.579899 env[1193]: time="2025-09-06T01:26:28.579855412Z" level=info msg="StartContainer for \"0996ceddffddc67d3a140bf368baab686ca186e27bf33ea723d4810132939d46\"" Sep 6 01:26:28.606213 systemd[1]: Started cri-containerd-0996ceddffddc67d3a140bf368baab686ca186e27bf33ea723d4810132939d46.scope. Sep 6 01:26:28.632425 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 6 01:26:28.633255 kernel: audit: type=1400 audit(1757121988.623:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.638905 kernel: audit: type=1400 audit(1757121988.623:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.638998 kernel: audit: type=1400 audit(1757121988.623:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.639033 kernel: audit: type=1400 audit(1757121988.623:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.644063 kernel: audit: type=1400 audit(1757121988.623:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.644155 kernel: audit: type=1400 audit(1757121988.623:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.649628 kernel: audit: type=1400 audit(1757121988.623:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.649698 kernel: audit: type=1400 audit(1757121988.623:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.652464 kernel: audit: type=1400 audit(1757121988.623:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.657946 kernel: audit: type=1400 audit(1757121988.624:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.624000 audit: BPF prog-id=128 op=LOAD Sep 6 01:26:28.637000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.637000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2832 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:28.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393663656464666664646336376433613134306266333638626161 Sep 6 01:26:28.637000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.637000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2832 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:28.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393663656464666664646336376433613134306266333638626161 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.640000 audit: BPF prog-id=129 op=LOAD Sep 6 01:26:28.640000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000283380 items=0 ppid=2832 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:28.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393663656464666664646336376433613134306266333638626161 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.645000 audit: BPF prog-id=130 op=LOAD Sep 6 01:26:28.645000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002833c8 items=0 ppid=2832 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:28.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393663656464666664646336376433613134306266333638626161 Sep 6 01:26:28.651000 audit: BPF prog-id=130 op=UNLOAD Sep 6 01:26:28.651000 audit: BPF prog-id=129 op=UNLOAD Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:28.651000 audit: BPF prog-id=131 op=LOAD Sep 6 01:26:28.651000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002837d8 items=0 ppid=2832 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:28.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393663656464666664646336376433613134306266333638626161 Sep 6 01:26:28.686708 env[1193]: time="2025-09-06T01:26:28.686655199Z" level=info msg="StartContainer for \"0996ceddffddc67d3a140bf368baab686ca186e27bf33ea723d4810132939d46\" returns successfully" Sep 6 01:26:28.740000 audit[3017]: AVC avc: denied { search } for pid=3017 comm="rpcbind" name="crypto" dev="proc" ino=25240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:26:28.740000 audit[3017]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2c32b000c0 a2=0 a3=0 items=0 ppid=3000 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 key=(null) Sep 6 01:26:28.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 6 01:26:28.802000 audit[3022]: AVC avc: denied { search } for pid=3022 comm="dbus-daemon" name="crypto" dev="proc" ino=25240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:26:28.802000 audit[3022]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb21cd7c0c0 a2=0 a3=0 items=0 ppid=3000 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 key=(null) Sep 6 01:26:28.802000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 01:26:28.810000 audit[3023]: AVC avc: denied { watch } for pid=3023 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=1051344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c138,c909 tclass=dir permissive=0 Sep 6 01:26:28.810000 audit[3023]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55685e72d530 a2=2c8 a3=7ffd668f54cc items=0 ppid=3000 pid=3023 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 key=(null) Sep 6 01:26:28.810000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 01:26:28.814000 audit[3024]: AVC avc: denied { read } for pid=3024 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25680 scontext=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 6 01:26:28.814000 audit[3024]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fba00dba320 a1=80000 a2=d a3=7fffb2490be0 items=0 ppid=3000 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 key=(null) Sep 6 01:26:28.814000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 01:26:28.816000 audit[3024]: AVC avc: denied { search } for pid=3024 comm="ganesha.nfsd" name="crypto" dev="proc" ino=25240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:26:28.816000 audit[3024]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fba0030e0c0 a2=0 a3=0 items=0 ppid=3000 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c138,c909 key=(null) Sep 6 01:26:28.816000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 01:26:29.098870 kubelet[1505]: E0906 01:26:29.098608 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:29.568341 kubelet[1505]: I0906 01:26:29.568214 1505 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.925345852 podStartE2EDuration="11.568082107s" podCreationTimestamp="2025-09-06 01:26:18 +0000 UTC" firstStartedPulling="2025-09-06 01:26:19.910896992 +0000 UTC m=+54.260305288" lastFinishedPulling="2025-09-06 01:26:28.553633238 +0000 UTC m=+62.903041543" observedRunningTime="2025-09-06 01:26:29.566481311 +0000 UTC m=+63.915889661" watchObservedRunningTime="2025-09-06 01:26:29.568082107 +0000 UTC m=+63.917490520" Sep 6 01:26:29.848000 audit[3064]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:29.848000 audit[3064]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd14b1f5e0 a2=0 a3=7ffd14b1f5cc items=0 ppid=1670 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:29.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:29.856000 audit[3064]: NETFILTER_CFG table=nat:79 family=2 entries=110 op=nft_register_chain pid=3064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:29.856000 audit[3064]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffd14b1f5e0 a2=0 a3=7ffd14b1f5cc items=0 ppid=1670 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:29.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:30.099545 kubelet[1505]: E0906 01:26:30.099456 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:31.100382 kubelet[1505]: E0906 01:26:31.100284 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:32.101047 kubelet[1505]: E0906 01:26:32.100980 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:33.102701 kubelet[1505]: E0906 01:26:33.102576 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:34.103733 kubelet[1505]: E0906 01:26:34.103663 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:35.105096 kubelet[1505]: E0906 01:26:35.104992 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:36.106986 kubelet[1505]: E0906 01:26:36.106898 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:37.109181 kubelet[1505]: E0906 01:26:37.109082 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:38.109926 kubelet[1505]: E0906 01:26:38.109835 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:38.285582 systemd[1]: Created slice kubepods-besteffort-pod8cf1a806_039c_4044_8c4a_de0441c69120.slice. Sep 6 01:26:38.450739 kubelet[1505]: I0906 01:26:38.450655 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a89e7be8-279a-4dfe-847a-e5f884236070\" (UniqueName: \"kubernetes.io/nfs/8cf1a806-039c-4044-8c4a-de0441c69120-pvc-a89e7be8-279a-4dfe-847a-e5f884236070\") pod \"test-pod-1\" (UID: \"8cf1a806-039c-4044-8c4a-de0441c69120\") " pod="default/test-pod-1" Sep 6 01:26:38.452224 kubelet[1505]: I0906 01:26:38.452178 1505 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7455r\" (UniqueName: \"kubernetes.io/projected/8cf1a806-039c-4044-8c4a-de0441c69120-kube-api-access-7455r\") pod \"test-pod-1\" (UID: \"8cf1a806-039c-4044-8c4a-de0441c69120\") " pod="default/test-pod-1" Sep 6 01:26:38.589000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.604105 kernel: Failed to create system directory netfs Sep 6 01:26:38.604352 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 01:26:38.604693 kernel: audit: type=1400 audit(1757121998.589:789): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.604784 kernel: Failed to create system directory netfs Sep 6 01:26:38.604842 kernel: audit: type=1400 audit(1757121998.589:789): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.589000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.608311 kernel: Failed to create system directory netfs Sep 6 01:26:38.608375 kernel: audit: type=1400 audit(1757121998.589:789): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.589000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.612123 kernel: Failed to create system directory netfs Sep 6 01:26:38.612195 kernel: audit: type=1400 audit(1757121998.589:789): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.589000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.589000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bea13b85e0 a1=153bc a2=55be87a972b0 a3=5 items=0 ppid=491 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:38.589000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:26:38.625729 kernel: audit: type=1300 audit(1757121998.589:789): arch=c000003e syscall=175 success=yes exit=0 a0=55bea13b85e0 a1=153bc a2=55be87a972b0 a3=5 items=0 ppid=491 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:38.625797 kernel: audit: type=1327 audit(1757121998.589:789): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.633814 kernel: Failed to create system directory fscache Sep 6 01:26:38.633864 kernel: audit: type=1400 audit(1757121998.625:790): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.633897 kernel: Failed to create system directory fscache Sep 6 01:26:38.633916 kernel: audit: type=1400 audit(1757121998.625:790): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.637194 kernel: Failed to create system directory fscache Sep 6 01:26:38.637225 kernel: audit: type=1400 audit(1757121998.625:790): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.640804 kernel: Failed to create system directory fscache Sep 6 01:26:38.640837 kernel: audit: type=1400 audit(1757121998.625:790): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.643757 kernel: Failed to create system directory fscache Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.645774 kernel: Failed to create system directory fscache Sep 6 01:26:38.645812 kernel: Failed to create system directory fscache Sep 6 01:26:38.645903 kernel: Failed to create system directory fscache Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.647176 kernel: Failed to create system directory fscache Sep 6 01:26:38.647212 kernel: Failed to create system directory fscache Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.648678 kernel: Failed to create system directory fscache Sep 6 01:26:38.648729 kernel: Failed to create system directory fscache Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.650133 kernel: Failed to create system directory fscache Sep 6 01:26:38.650174 kernel: Failed to create system directory fscache Sep 6 01:26:38.625000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.625000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bea15cd9c0 a1=4c0fc a2=55be87a972b0 a3=5 items=0 ppid=491 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:38.625000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:26:38.653124 kernel: FS-Cache: Loaded Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.691813 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.691915 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.691975 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.693182 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.693247 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.694471 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.694557 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.695158 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.696501 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.696577 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.698556 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.698632 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.698690 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.699229 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.700588 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.700666 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.701252 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.705323 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.705442 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.711741 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.711808 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.713239 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.713308 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.714746 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.714806 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.715486 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.717675 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.717727 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.717768 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.719734 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.719793 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.719838 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.720434 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.721788 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.721860 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.723265 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.723330 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.724644 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.724705 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.725340 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.726702 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.726769 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.728773 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.728837 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.728876 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.729465 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.730216 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.731581 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.731657 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.732273 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.733788 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.733861 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.735339 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.735410 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.736820 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.736884 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.737616 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.738389 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.739818 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.739881 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.740507 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.741239 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.742761 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.742834 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.743530 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.744196 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.745644 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.745719 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.746339 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.747912 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.747976 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.748536 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.749295 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.750790 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.750878 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.751552 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.752262 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.753754 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.753832 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.754463 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.755838 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.755917 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.756520 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.757221 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.758595 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.758668 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.759331 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.760877 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.760926 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.761573 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.762313 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.763808 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.763871 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.764556 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.765316 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.766736 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.766806 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.767442 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.768256 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.769786 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.769856 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.770509 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.771314 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.772743 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.772800 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.773455 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.774273 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.775798 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.775864 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.776539 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.777190 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.778760 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.778825 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.779452 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.780320 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.781705 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.781785 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.782403 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.783225 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.784682 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.784768 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.785311 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.786785 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.786855 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.787501 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.675000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.792956 kernel: Failed to create system directory sunrpc Sep 6 01:26:38.803809 kernel: RPC: Registered named UNIX socket transport module. Sep 6 01:26:38.803920 kernel: RPC: Registered udp transport module. Sep 6 01:26:38.803980 kernel: RPC: Registered tcp transport module. Sep 6 01:26:38.804019 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 6 01:26:38.675000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bea1619ad0 a1=1a81bc a2=55be87a972b0 a3=5 items=6 ppid=491 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:38.675000 audit: CWD cwd="/" Sep 6 01:26:38.675000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:26:38.675000 audit: PATH item=1 name=(null) inode=25448 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:26:38.675000 audit: PATH item=2 name=(null) inode=25448 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:26:38.675000 audit: PATH item=3 name=(null) inode=25449 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:26:38.675000 audit: PATH item=4 name=(null) inode=25448 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:26:38.675000 audit: PATH item=5 name=(null) inode=25450 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:26:38.675000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.852634 kernel: Failed to create system directory nfs Sep 6 01:26:38.852788 kernel: Failed to create system directory nfs Sep 6 01:26:38.852856 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.854006 kernel: Failed to create system directory nfs Sep 6 01:26:38.854160 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.854509 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.856057 kernel: Failed to create system directory nfs Sep 6 01:26:38.856192 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.856535 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.857873 kernel: Failed to create system directory nfs Sep 6 01:26:38.857994 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.858505 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.859856 kernel: Failed to create system directory nfs Sep 6 01:26:38.860096 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.860560 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.861200 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.862516 kernel: Failed to create system directory nfs Sep 6 01:26:38.862586 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.863831 kernel: Failed to create system directory nfs Sep 6 01:26:38.863889 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.864442 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.865817 kernel: Failed to create system directory nfs Sep 6 01:26:38.865875 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.866431 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.867204 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.868653 kernel: Failed to create system directory nfs Sep 6 01:26:38.868721 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.869259 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.870650 kernel: Failed to create system directory nfs Sep 6 01:26:38.870721 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.872857 kernel: Failed to create system directory nfs Sep 6 01:26:38.872913 kernel: Failed to create system directory nfs Sep 6 01:26:38.872944 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.874277 kernel: Failed to create system directory nfs Sep 6 01:26:38.874330 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.875713 kernel: Failed to create system directory nfs Sep 6 01:26:38.875753 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.876355 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.877726 kernel: Failed to create system directory nfs Sep 6 01:26:38.877776 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.879731 kernel: Failed to create system directory nfs Sep 6 01:26:38.879790 kernel: Failed to create system directory nfs Sep 6 01:26:38.879820 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.881887 kernel: Failed to create system directory nfs Sep 6 01:26:38.881974 kernel: Failed to create system directory nfs Sep 6 01:26:38.882023 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.882563 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.883340 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.884706 kernel: Failed to create system directory nfs Sep 6 01:26:38.884751 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.885342 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.886791 kernel: Failed to create system directory nfs Sep 6 01:26:38.886851 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.887627 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.888349 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.889834 kernel: Failed to create system directory nfs Sep 6 01:26:38.889904 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.891330 kernel: Failed to create system directory nfs Sep 6 01:26:38.891387 kernel: Failed to create system directory nfs Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.838000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.892861 kernel: Failed to create system directory nfs Sep 6 01:26:38.914587 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 6 01:26:38.838000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bea183aaf0 a1=16f02c a2=55be87a972b0 a3=5 items=0 ppid=491 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:38.838000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.964196 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.964254 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.965628 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.965659 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.966562 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.967376 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.968185 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.977205 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.978740 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.978768 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.979578 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.980395 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.981237 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.982141 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.983715 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.983751 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.984574 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.985340 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.986162 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.987839 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.987873 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.988784 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.989574 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.990380 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.991192 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.992809 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.992835 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.993642 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.994491 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.995250 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.996736 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.996764 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.997509 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.998253 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.999801 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.999830 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.000666 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.001509 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.002347 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.003205 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.004819 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.004846 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.005598 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.006364 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.007128 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.008745 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.008783 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.009629 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.010474 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.011303 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.012164 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.013167 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.014761 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.014796 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.015587 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.016430 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.017270 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.018159 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.019753 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.019780 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.020540 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.021278 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.022154 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.023732 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.023768 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.026171 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.027739 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.028617 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.029369 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.030140 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.031782 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.031824 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.032657 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.033470 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.034292 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.035123 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.036744 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.036785 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.037634 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.038456 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.039432 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.040262 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.041767 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.041801 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.042556 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.043330 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.044198 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.045688 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.045721 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.046557 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.047378 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.048226 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.049724 kernel: Failed to create system directory nfs4 Sep 6 01:26:39.049750 kernel: Failed to create system directory nfs4 Sep 6 01:26:38.947000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.112159 kubelet[1505]: E0906 01:26:39.111794 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:39.181780 kernel: NFS: Registering the id_resolver key type Sep 6 01:26:39.182024 kernel: Key type id_resolver registered Sep 6 01:26:39.182094 kernel: Key type id_legacy registered Sep 6 01:26:38.947000 audit[3084]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f9da74dd010 a1=20955c a2=55cc598c92b0 a3=5 items=0 ppid=491 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:38.947000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.202544 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.202639 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.203506 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.204380 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.205291 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.206178 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.207872 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.207918 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.208785 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.209661 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.210538 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.211417 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.212290 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.213166 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.214877 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.214928 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.215858 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.216680 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.217512 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.218466 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.219323 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.220176 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.221793 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.221829 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.222639 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.223446 kernel: Failed to create system directory rpcgss Sep 6 01:26:39.196000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:26:39.196000 audit[3085]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f30c1b2d010 a1=70bac a2=564fdb0182b0 a3=5 items=0 ppid=491 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:39.196000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 6 01:26:39.254974 nfsidmap[3091]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Sep 6 01:26:39.268027 nfsidmap[3094]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Sep 6 01:26:39.279000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:26:39.279000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ebac9d5d0 a2=10 a3=8e888459c67b27f5 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:39.279000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 01:26:39.279000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:26:39.279000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ebac9d5d0 a2=10 a3=8e888459c67b27f5 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:39.279000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 01:26:39.279000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:26:39.279000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561ebac9d5d0 a2=10 a3=8e888459c67b27f5 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:39.279000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 01:26:39.279000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:26:39.279000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:26:39.279000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:26:39.491313 env[1193]: time="2025-09-06T01:26:39.490970380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:8cf1a806-039c-4044-8c4a-de0441c69120,Namespace:default,Attempt:0,}" Sep 6 01:26:39.945123 systemd-networkd[1031]: cali5ec59c6bf6e: Link UP Sep 6 01:26:39.949453 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:26:39.949578 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 6 01:26:39.949945 systemd-networkd[1031]: cali5ec59c6bf6e: Gained carrier Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.644 [INFO][3097] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.95.46-k8s-test--pod--1-eth0 default 8cf1a806-039c-4044-8c4a-de0441c69120 1450 0 2025-09-06 01:26:21 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.95.46 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.645 [INFO][3097] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-eth0" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.728 [INFO][3109] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" HandleID="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Workload="10.244.95.46-k8s-test--pod--1-eth0" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.728 [INFO][3109] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" HandleID="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Workload="10.244.95.46-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9610), Attrs:map[string]string{"namespace":"default", "node":"10.244.95.46", "pod":"test-pod-1", "timestamp":"2025-09-06 01:26:39.728314162 +0000 UTC"}, Hostname:"10.244.95.46", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.728 [INFO][3109] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.728 [INFO][3109] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.728 [INFO][3109] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.95.46' Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.769 [INFO][3109] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.801 [INFO][3109] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.816 [INFO][3109] ipam/ipam.go 511: Trying affinity for 192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.824 [INFO][3109] ipam/ipam.go 158: Attempting to load block cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.843 [INFO][3109] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.843 [INFO][3109] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.859 [INFO][3109] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140 Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.891 [INFO][3109] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.921 [INFO][3109] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.3.132/26] block=192.168.3.128/26 handle="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.922 [INFO][3109] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.3.132/26] handle="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" host="10.244.95.46" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.922 [INFO][3109] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.922 [INFO][3109] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.132/26] IPv6=[] ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" HandleID="k8s-pod-network.694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Workload="10.244.95.46-k8s-test--pod--1-eth0" Sep 6 01:26:39.997628 env[1193]: 2025-09-06 01:26:39.926 [INFO][3097] cni-plugin/k8s.go 418: Populated endpoint ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"8cf1a806-039c-4044-8c4a-de0441c69120", ResourceVersion:"1450", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 26, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:40.000576 env[1193]: 2025-09-06 01:26:39.926 [INFO][3097] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.3.132/32] ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-eth0" Sep 6 01:26:40.000576 env[1193]: 2025-09-06 01:26:39.927 [INFO][3097] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-eth0" Sep 6 01:26:40.000576 env[1193]: 2025-09-06 01:26:39.950 [INFO][3097] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-eth0" Sep 6 01:26:40.000576 env[1193]: 2025-09-06 01:26:39.951 [INFO][3097] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.95.46-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"8cf1a806-039c-4044-8c4a-de0441c69120", ResourceVersion:"1450", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 26, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.95.46", ContainerID:"694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"9e:a9:24:0a:c1:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:26:40.000576 env[1193]: 2025-09-06 01:26:39.993 [INFO][3097] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.95.46-k8s-test--pod--1-eth0" Sep 6 01:26:40.022824 env[1193]: time="2025-09-06T01:26:40.022730452Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:26:40.022824 env[1193]: time="2025-09-06T01:26:40.022828737Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:26:40.022824 env[1193]: time="2025-09-06T01:26:40.022857206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:26:40.023372 env[1193]: time="2025-09-06T01:26:40.023306706Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140 pid=3133 runtime=io.containerd.runc.v2 Sep 6 01:26:40.060879 systemd[1]: Started cri-containerd-694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140.scope. Sep 6 01:26:40.067998 systemd[1]: run-containerd-runc-k8s.io-694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140-runc.O8dtOH.mount: Deactivated successfully. Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.098000 audit: BPF prog-id=132 op=LOAD Sep 6 01:26:40.099000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.099000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=3133 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346330313634366464623339323637323337343734326461626366 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=3133 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346330313634366464623339323637323337343734326461626366 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.100000 audit: BPF prog-id=133 op=LOAD Sep 6 01:26:40.100000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c0003f0100 items=0 ppid=3133 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346330313634366464623339323637323337343734326461626366 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.101000 audit: BPF prog-id=134 op=LOAD Sep 6 01:26:40.101000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c0003f0148 items=0 ppid=3133 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346330313634366464623339323637323337343734326461626366 Sep 6 01:26:40.101000 audit: BPF prog-id=134 op=UNLOAD Sep 6 01:26:40.102000 audit: BPF prog-id=133 op=UNLOAD Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.102000 audit: BPF prog-id=135 op=LOAD Sep 6 01:26:40.102000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0003f0558 items=0 ppid=3133 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346330313634366464623339323637323337343734326461626366 Sep 6 01:26:40.108000 audit[3162]: NETFILTER_CFG table=filter:80 family=2 entries=36 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:26:40.108000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7fff5e092120 a2=0 a3=7fff5e09210c items=0 ppid=2194 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.108000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:26:40.112979 kubelet[1505]: E0906 01:26:40.112869 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:40.138859 env[1193]: time="2025-09-06T01:26:40.138819536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:8cf1a806-039c-4044-8c4a-de0441c69120,Namespace:default,Attempt:0,} returns sandbox id \"694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140\"" Sep 6 01:26:40.140759 env[1193]: time="2025-09-06T01:26:40.140724816Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 01:26:40.518494 env[1193]: time="2025-09-06T01:26:40.518395680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:40.520699 env[1193]: time="2025-09-06T01:26:40.520649572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:40.523861 env[1193]: time="2025-09-06T01:26:40.523809482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:40.526562 env[1193]: time="2025-09-06T01:26:40.526502776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:26:40.528053 env[1193]: time="2025-09-06T01:26:40.527993401Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 01:26:40.533161 env[1193]: time="2025-09-06T01:26:40.533060751Z" level=info msg="CreateContainer within sandbox \"694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 6 01:26:40.550702 env[1193]: time="2025-09-06T01:26:40.550658811Z" level=info msg="CreateContainer within sandbox \"694c01646ddb392672374742dabcf0c785ced5cefc792191dfb3069215086140\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"ea778c82a5afe9a2228b39fd0107cde4f19cf0faed594fb950ccaaea930599c9\"" Sep 6 01:26:40.551305 env[1193]: time="2025-09-06T01:26:40.551171517Z" level=info msg="StartContainer for \"ea778c82a5afe9a2228b39fd0107cde4f19cf0faed594fb950ccaaea930599c9\"" Sep 6 01:26:40.579840 systemd[1]: Started cri-containerd-ea778c82a5afe9a2228b39fd0107cde4f19cf0faed594fb950ccaaea930599c9.scope. Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.603000 audit: BPF prog-id=136 op=LOAD Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3133 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373738633832613561666539613232323862333966643031303763 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3133 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373738633832613561666539613232323862333966643031303763 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit: BPF prog-id=137 op=LOAD Sep 6 01:26:40.604000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000025b90 items=0 ppid=3133 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373738633832613561666539613232323862333966643031303763 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit: BPF prog-id=138 op=LOAD Sep 6 01:26:40.604000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000025bd8 items=0 ppid=3133 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373738633832613561666539613232323862333966643031303763 Sep 6 01:26:40.604000 audit: BPF prog-id=138 op=UNLOAD Sep 6 01:26:40.604000 audit: BPF prog-id=137 op=UNLOAD Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:26:40.604000 audit: BPF prog-id=139 op=LOAD Sep 6 01:26:40.604000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000025fe8 items=0 ppid=3133 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:40.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373738633832613561666539613232323862333966643031303763 Sep 6 01:26:40.622761 env[1193]: time="2025-09-06T01:26:40.621919908Z" level=info msg="StartContainer for \"ea778c82a5afe9a2228b39fd0107cde4f19cf0faed594fb950ccaaea930599c9\" returns successfully" Sep 6 01:26:41.113261 kubelet[1505]: E0906 01:26:41.113091 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:41.632457 systemd-networkd[1031]: cali5ec59c6bf6e: Gained IPv6LL Sep 6 01:26:42.114155 kubelet[1505]: E0906 01:26:42.113813 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:43.115040 kubelet[1505]: E0906 01:26:43.114976 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:44.116613 kubelet[1505]: E0906 01:26:44.116541 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:45.118267 kubelet[1505]: E0906 01:26:45.118048 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:46.028895 kubelet[1505]: E0906 01:26:46.028819 1505 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:46.118551 kubelet[1505]: E0906 01:26:46.118472 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:47.119323 kubelet[1505]: E0906 01:26:47.119106 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:48.120479 kubelet[1505]: E0906 01:26:48.120362 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:49.122329 kubelet[1505]: E0906 01:26:49.122237 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:50.123351 kubelet[1505]: E0906 01:26:50.123226 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:51.123810 kubelet[1505]: E0906 01:26:51.123665 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:52.002500 systemd[1]: run-containerd-runc-k8s.io-d5e71d86fe729aee20bd3bf7c822f764df9ed214e7328443a8bd6129ba8333bc-runc.lY6Ma2.mount: Deactivated successfully. Sep 6 01:26:52.124482 kubelet[1505]: E0906 01:26:52.124436 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:53.125500 kubelet[1505]: E0906 01:26:53.125402 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:54.126064 kubelet[1505]: E0906 01:26:54.125979 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:55.126994 kubelet[1505]: E0906 01:26:55.126904 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:56.127679 kubelet[1505]: E0906 01:26:56.127586 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:26:57.127955 kubelet[1505]: E0906 01:26:57.127876 1505 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"