Sep 6 00:30:12.991825 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 00:30:12.991874 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:30:12.991896 kernel: BIOS-provided physical RAM map: Sep 6 00:30:12.991906 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Sep 6 00:30:12.991916 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Sep 6 00:30:12.991926 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Sep 6 00:30:12.991938 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Sep 6 00:30:12.991948 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Sep 6 00:30:12.991958 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Sep 6 00:30:12.991968 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Sep 6 00:30:12.991983 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Sep 6 00:30:12.991993 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Sep 6 00:30:12.992004 kernel: NX (Execute Disable) protection: active Sep 6 00:30:12.992014 kernel: SMBIOS 2.8 present. Sep 6 00:30:12.992027 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Sep 6 00:30:12.992038 kernel: Hypervisor detected: KVM Sep 6 00:30:12.992053 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 6 00:30:12.992064 kernel: kvm-clock: cpu 0, msr 2019f001, primary cpu clock Sep 6 00:30:12.992075 kernel: kvm-clock: using sched offset of 5229881734 cycles Sep 6 00:30:12.992087 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 6 00:30:12.992099 kernel: tsc: Detected 2499.998 MHz processor Sep 6 00:30:12.992110 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 00:30:12.992121 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 00:30:12.992132 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Sep 6 00:30:12.992143 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 00:30:12.992159 kernel: Using GB pages for direct mapping Sep 6 00:30:12.992170 kernel: ACPI: Early table checksum verification disabled Sep 6 00:30:12.992181 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Sep 6 00:30:12.992192 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:30:12.992204 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:30:12.992215 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:30:12.992226 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Sep 6 00:30:12.992237 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:30:12.992248 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:30:12.992264 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:30:12.992275 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:30:12.992286 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Sep 6 00:30:12.992297 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Sep 6 00:30:12.992308 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Sep 6 00:30:12.992319 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Sep 6 00:30:12.992337 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Sep 6 00:30:12.992353 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Sep 6 00:30:12.992364 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Sep 6 00:30:12.992377 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 00:30:12.992410 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 00:30:12.992423 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Sep 6 00:30:12.992434 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Sep 6 00:30:12.992446 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Sep 6 00:30:12.992463 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Sep 6 00:30:12.992476 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Sep 6 00:30:12.992488 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Sep 6 00:30:12.992499 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Sep 6 00:30:12.992511 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Sep 6 00:30:12.992523 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Sep 6 00:30:12.992535 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Sep 6 00:30:12.992547 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Sep 6 00:30:12.992558 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Sep 6 00:30:12.992570 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Sep 6 00:30:12.992586 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Sep 6 00:30:12.992598 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 6 00:30:12.992610 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 6 00:30:12.992622 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Sep 6 00:30:12.992634 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Sep 6 00:30:12.992646 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Sep 6 00:30:12.992658 kernel: Zone ranges: Sep 6 00:30:12.992670 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 00:30:12.992682 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Sep 6 00:30:12.992698 kernel: Normal empty Sep 6 00:30:12.992721 kernel: Movable zone start for each node Sep 6 00:30:12.992733 kernel: Early memory node ranges Sep 6 00:30:12.992745 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Sep 6 00:30:12.992757 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Sep 6 00:30:12.992768 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Sep 6 00:30:12.992780 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 00:30:12.992792 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Sep 6 00:30:12.992803 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Sep 6 00:30:12.992820 kernel: ACPI: PM-Timer IO Port: 0x608 Sep 6 00:30:12.992832 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 6 00:30:12.992844 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 6 00:30:12.992856 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 6 00:30:12.992868 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 6 00:30:12.992879 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 00:30:12.992891 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 6 00:30:12.992903 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 6 00:30:12.992915 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 00:30:12.992931 kernel: TSC deadline timer available Sep 6 00:30:12.992943 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Sep 6 00:30:12.992955 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Sep 6 00:30:12.992966 kernel: Booting paravirtualized kernel on KVM Sep 6 00:30:12.992979 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 00:30:12.992991 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Sep 6 00:30:12.993002 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Sep 6 00:30:12.993014 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Sep 6 00:30:12.993026 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 6 00:30:12.993042 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Sep 6 00:30:12.993054 kernel: kvm-guest: PV spinlocks enabled Sep 6 00:30:12.993066 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 00:30:12.993078 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Sep 6 00:30:12.993089 kernel: Policy zone: DMA32 Sep 6 00:30:12.993102 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:30:12.993115 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 00:30:12.993126 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 00:30:12.993142 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 00:30:12.993155 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 00:30:12.993167 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 192524K reserved, 0K cma-reserved) Sep 6 00:30:12.993179 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 6 00:30:12.993191 kernel: Kernel/User page tables isolation: enabled Sep 6 00:30:12.993203 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 00:30:12.993214 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 00:30:12.993226 kernel: rcu: Hierarchical RCU implementation. Sep 6 00:30:12.993239 kernel: rcu: RCU event tracing is enabled. Sep 6 00:30:12.993255 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 6 00:30:12.993267 kernel: Rude variant of Tasks RCU enabled. Sep 6 00:30:12.993279 kernel: Tracing variant of Tasks RCU enabled. Sep 6 00:30:12.993291 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 00:30:12.993303 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 6 00:30:12.993315 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Sep 6 00:30:12.993327 kernel: random: crng init done Sep 6 00:30:12.993352 kernel: Console: colour VGA+ 80x25 Sep 6 00:30:12.993365 kernel: printk: console [tty0] enabled Sep 6 00:30:12.993378 kernel: printk: console [ttyS0] enabled Sep 6 00:30:12.993407 kernel: ACPI: Core revision 20210730 Sep 6 00:30:12.993419 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 00:30:12.993437 kernel: x2apic enabled Sep 6 00:30:12.993450 kernel: Switched APIC routing to physical x2apic. Sep 6 00:30:12.993463 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Sep 6 00:30:12.993476 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Sep 6 00:30:12.993488 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 6 00:30:12.993505 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 6 00:30:12.993517 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 6 00:30:12.993530 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 00:30:12.993542 kernel: Spectre V2 : Mitigation: Retpolines Sep 6 00:30:12.993554 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 6 00:30:12.993567 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Sep 6 00:30:12.993579 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 6 00:30:12.993592 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 6 00:30:12.993604 kernel: MDS: Mitigation: Clear CPU buffers Sep 6 00:30:12.993617 kernel: MMIO Stale Data: Unknown: No mitigations Sep 6 00:30:12.993629 kernel: SRBDS: Unknown: Dependent on hypervisor status Sep 6 00:30:12.993645 kernel: active return thunk: its_return_thunk Sep 6 00:30:12.993657 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 00:30:12.993670 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 00:30:12.993683 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 00:30:12.993695 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 00:30:12.993716 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 00:30:12.993730 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Sep 6 00:30:12.993743 kernel: Freeing SMP alternatives memory: 32K Sep 6 00:30:12.993755 kernel: pid_max: default: 32768 minimum: 301 Sep 6 00:30:12.993767 kernel: LSM: Security Framework initializing Sep 6 00:30:12.993779 kernel: SELinux: Initializing. Sep 6 00:30:12.993797 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 00:30:12.993809 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 00:30:12.993822 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Sep 6 00:30:12.993834 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Sep 6 00:30:12.993847 kernel: signal: max sigframe size: 1776 Sep 6 00:30:12.993860 kernel: rcu: Hierarchical SRCU implementation. Sep 6 00:30:12.993872 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 00:30:12.993885 kernel: smp: Bringing up secondary CPUs ... Sep 6 00:30:12.993897 kernel: x86: Booting SMP configuration: Sep 6 00:30:12.993909 kernel: .... node #0, CPUs: #1 Sep 6 00:30:12.993926 kernel: kvm-clock: cpu 1, msr 2019f041, secondary cpu clock Sep 6 00:30:12.993938 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Sep 6 00:30:12.993951 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Sep 6 00:30:12.993963 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 00:30:12.993976 kernel: smpboot: Max logical packages: 16 Sep 6 00:30:12.993988 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Sep 6 00:30:12.994001 kernel: devtmpfs: initialized Sep 6 00:30:12.994013 kernel: x86/mm: Memory block size: 128MB Sep 6 00:30:12.994025 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 00:30:12.994042 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 6 00:30:12.994055 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 00:30:12.994067 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 00:30:12.994080 kernel: audit: initializing netlink subsys (disabled) Sep 6 00:30:12.994092 kernel: audit: type=2000 audit(1757118610.842:1): state=initialized audit_enabled=0 res=1 Sep 6 00:30:12.994105 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 00:30:12.994117 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 00:30:12.994130 kernel: cpuidle: using governor menu Sep 6 00:30:12.994142 kernel: ACPI: bus type PCI registered Sep 6 00:30:12.994159 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 00:30:12.994171 kernel: dca service started, version 1.12.1 Sep 6 00:30:12.994184 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Sep 6 00:30:12.994196 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Sep 6 00:30:12.994209 kernel: PCI: Using configuration type 1 for base access Sep 6 00:30:12.994221 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 00:30:12.994234 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 00:30:12.994247 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 00:30:12.994259 kernel: ACPI: Added _OSI(Module Device) Sep 6 00:30:12.994275 kernel: ACPI: Added _OSI(Processor Device) Sep 6 00:30:12.994288 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 00:30:12.994300 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 00:30:12.994313 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 00:30:12.994325 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 00:30:12.994338 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 00:30:12.994350 kernel: ACPI: Interpreter enabled Sep 6 00:30:12.994363 kernel: ACPI: PM: (supports S0 S5) Sep 6 00:30:12.994375 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 00:30:12.994407 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 00:30:12.994419 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Sep 6 00:30:12.994432 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 6 00:30:12.994739 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 6 00:30:12.994905 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 6 00:30:12.995062 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 6 00:30:12.995081 kernel: PCI host bridge to bus 0000:00 Sep 6 00:30:12.995261 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 6 00:30:12.995424 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 6 00:30:12.995572 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 6 00:30:12.995729 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Sep 6 00:30:12.995875 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 6 00:30:12.996018 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Sep 6 00:30:12.996170 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 6 00:30:12.996357 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Sep 6 00:30:13.000598 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Sep 6 00:30:13.000784 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Sep 6 00:30:13.000946 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Sep 6 00:30:13.001104 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Sep 6 00:30:13.001260 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 6 00:30:13.001456 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.001620 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Sep 6 00:30:13.001818 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.001977 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Sep 6 00:30:13.002145 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.002302 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Sep 6 00:30:13.005549 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.005747 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Sep 6 00:30:13.005925 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.006089 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Sep 6 00:30:13.006258 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.006432 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Sep 6 00:30:13.006600 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.006781 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Sep 6 00:30:13.006952 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Sep 6 00:30:13.007110 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Sep 6 00:30:13.007277 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Sep 6 00:30:13.007450 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Sep 6 00:30:13.007607 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Sep 6 00:30:13.007785 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Sep 6 00:30:13.007940 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Sep 6 00:30:13.008113 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Sep 6 00:30:13.008271 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Sep 6 00:30:13.008441 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Sep 6 00:30:13.008598 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Sep 6 00:30:13.008780 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Sep 6 00:30:13.008946 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Sep 6 00:30:13.009112 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Sep 6 00:30:13.009273 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Sep 6 00:30:13.009446 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Sep 6 00:30:13.009630 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Sep 6 00:30:13.009803 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Sep 6 00:30:13.009978 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Sep 6 00:30:13.010153 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Sep 6 00:30:13.010317 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 00:30:13.010488 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 00:30:13.010649 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 00:30:13.010842 kernel: pci_bus 0000:02: extended config space not accessible Sep 6 00:30:13.011040 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Sep 6 00:30:13.011221 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Sep 6 00:30:13.011415 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 00:30:13.011600 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 00:30:13.011815 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Sep 6 00:30:13.012007 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Sep 6 00:30:13.012200 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 00:30:13.021421 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 00:30:13.021715 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 00:30:13.021915 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Sep 6 00:30:13.022097 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Sep 6 00:30:13.022268 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 00:30:13.022453 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 00:30:13.022614 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 00:30:13.022794 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 00:30:13.022968 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 00:30:13.023126 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 00:30:13.023289 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 00:30:13.023463 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 00:30:13.023621 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 00:30:13.023797 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 00:30:13.023955 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 00:30:13.024112 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 00:30:13.024280 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 00:30:13.024459 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 00:30:13.024618 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 00:30:13.024792 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 00:30:13.024950 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 00:30:13.025106 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 00:30:13.025125 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 6 00:30:13.025139 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 6 00:30:13.025158 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 6 00:30:13.025172 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 6 00:30:13.025185 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Sep 6 00:30:13.025198 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Sep 6 00:30:13.025211 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Sep 6 00:30:13.025224 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Sep 6 00:30:13.025236 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Sep 6 00:30:13.025249 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Sep 6 00:30:13.025263 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Sep 6 00:30:13.025280 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Sep 6 00:30:13.025293 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Sep 6 00:30:13.025306 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Sep 6 00:30:13.025319 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Sep 6 00:30:13.025332 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Sep 6 00:30:13.025344 kernel: iommu: Default domain type: Translated Sep 6 00:30:13.025357 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 00:30:13.025528 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Sep 6 00:30:13.025688 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 6 00:30:13.025864 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Sep 6 00:30:13.025884 kernel: vgaarb: loaded Sep 6 00:30:13.025897 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 00:30:13.025910 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 00:30:13.025923 kernel: PTP clock support registered Sep 6 00:30:13.025936 kernel: PCI: Using ACPI for IRQ routing Sep 6 00:30:13.025949 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 6 00:30:13.025962 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Sep 6 00:30:13.025980 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Sep 6 00:30:13.025993 kernel: clocksource: Switched to clocksource kvm-clock Sep 6 00:30:13.026006 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 00:30:13.026019 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 00:30:13.026033 kernel: pnp: PnP ACPI init Sep 6 00:30:13.026239 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Sep 6 00:30:13.026260 kernel: pnp: PnP ACPI: found 5 devices Sep 6 00:30:13.026273 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 00:30:13.026286 kernel: NET: Registered PF_INET protocol family Sep 6 00:30:13.026305 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 00:30:13.026318 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 6 00:30:13.026331 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 00:30:13.026344 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 00:30:13.026357 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 6 00:30:13.026370 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 6 00:30:13.026406 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 00:30:13.026420 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 00:30:13.026438 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 00:30:13.026451 kernel: NET: Registered PF_XDP protocol family Sep 6 00:30:13.026611 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Sep 6 00:30:13.026781 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Sep 6 00:30:13.026936 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Sep 6 00:30:13.027104 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Sep 6 00:30:13.027260 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Sep 6 00:30:13.027437 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Sep 6 00:30:13.027598 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Sep 6 00:30:13.027773 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Sep 6 00:30:13.027932 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Sep 6 00:30:13.028091 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Sep 6 00:30:13.028253 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Sep 6 00:30:13.041782 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Sep 6 00:30:13.042024 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Sep 6 00:30:13.042190 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Sep 6 00:30:13.042355 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Sep 6 00:30:13.042534 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Sep 6 00:30:13.042719 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 00:30:13.042890 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 00:30:13.043055 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 00:30:13.043215 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Sep 6 00:30:13.043395 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 00:30:13.043564 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 00:30:13.043767 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 00:30:13.043927 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Sep 6 00:30:13.044104 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 00:30:13.044276 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 00:30:13.044464 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 00:30:13.044637 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Sep 6 00:30:13.044809 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 00:30:13.044988 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 00:30:13.045181 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 00:30:13.045353 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Sep 6 00:30:13.045538 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 00:30:13.045721 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 00:30:13.045896 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 00:30:13.046073 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Sep 6 00:30:13.046231 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 00:30:13.046420 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 00:30:13.046594 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 00:30:13.046775 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Sep 6 00:30:13.046946 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 00:30:13.047118 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 00:30:13.047290 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 00:30:13.047483 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Sep 6 00:30:13.047641 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 00:30:13.047825 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 00:30:13.047999 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 00:30:13.048170 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Sep 6 00:30:13.048348 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 00:30:13.048534 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 00:30:13.048702 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 6 00:30:13.048861 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 6 00:30:13.049022 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 6 00:30:13.049179 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Sep 6 00:30:13.049336 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Sep 6 00:30:13.049513 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Sep 6 00:30:13.049697 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Sep 6 00:30:13.049870 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Sep 6 00:30:13.050041 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 00:30:13.050224 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Sep 6 00:30:13.050524 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Sep 6 00:30:13.050678 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Sep 6 00:30:13.050839 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 00:30:13.051012 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Sep 6 00:30:13.051161 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Sep 6 00:30:13.051309 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 00:30:13.051493 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Sep 6 00:30:13.051644 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Sep 6 00:30:13.051805 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 00:30:13.051968 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Sep 6 00:30:13.052126 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Sep 6 00:30:13.052276 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 00:30:13.052467 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Sep 6 00:30:13.052619 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Sep 6 00:30:13.052781 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 00:30:13.052942 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Sep 6 00:30:13.053098 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Sep 6 00:30:13.053249 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 00:30:13.053426 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Sep 6 00:30:13.053579 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Sep 6 00:30:13.053740 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 00:30:13.053761 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Sep 6 00:30:13.053776 kernel: PCI: CLS 0 bytes, default 64 Sep 6 00:30:13.053790 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 6 00:30:13.053810 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Sep 6 00:30:13.053824 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 00:30:13.053839 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Sep 6 00:30:13.053853 kernel: Initialise system trusted keyrings Sep 6 00:30:13.053867 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 6 00:30:13.053881 kernel: Key type asymmetric registered Sep 6 00:30:13.053894 kernel: Asymmetric key parser 'x509' registered Sep 6 00:30:13.053907 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 00:30:13.053921 kernel: io scheduler mq-deadline registered Sep 6 00:30:13.053939 kernel: io scheduler kyber registered Sep 6 00:30:13.053953 kernel: io scheduler bfq registered Sep 6 00:30:13.054114 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Sep 6 00:30:13.054275 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Sep 6 00:30:13.054447 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.054607 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Sep 6 00:30:13.054780 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Sep 6 00:30:13.054945 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.055107 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Sep 6 00:30:13.055265 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Sep 6 00:30:13.055443 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.055609 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Sep 6 00:30:13.055781 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Sep 6 00:30:13.055945 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.056109 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Sep 6 00:30:13.056268 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Sep 6 00:30:13.056459 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.056618 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Sep 6 00:30:13.056789 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Sep 6 00:30:13.056952 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.057109 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Sep 6 00:30:13.057264 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Sep 6 00:30:13.064300 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.064546 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Sep 6 00:30:13.064724 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Sep 6 00:30:13.064904 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:30:13.064926 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 00:30:13.064942 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Sep 6 00:30:13.064956 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Sep 6 00:30:13.064970 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 00:30:13.064984 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 00:30:13.064998 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 6 00:30:13.065019 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 6 00:30:13.065037 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 6 00:30:13.065217 kernel: rtc_cmos 00:03: RTC can wake from S4 Sep 6 00:30:13.065240 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 6 00:30:13.065399 kernel: rtc_cmos 00:03: registered as rtc0 Sep 6 00:30:13.065553 kernel: rtc_cmos 00:03: setting system clock to 2025-09-06T00:30:12 UTC (1757118612) Sep 6 00:30:13.065702 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Sep 6 00:30:13.065732 kernel: intel_pstate: CPU model not supported Sep 6 00:30:13.065746 kernel: NET: Registered PF_INET6 protocol family Sep 6 00:30:13.065766 kernel: Segment Routing with IPv6 Sep 6 00:30:13.065780 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 00:30:13.065794 kernel: NET: Registered PF_PACKET protocol family Sep 6 00:30:13.065807 kernel: Key type dns_resolver registered Sep 6 00:30:13.065821 kernel: IPI shorthand broadcast: enabled Sep 6 00:30:13.065835 kernel: sched_clock: Marking stable (995799554, 224190523)->(1508831836, -288841759) Sep 6 00:30:13.065849 kernel: registered taskstats version 1 Sep 6 00:30:13.065862 kernel: Loading compiled-in X.509 certificates Sep 6 00:30:13.065876 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 00:30:13.065894 kernel: Key type .fscrypt registered Sep 6 00:30:13.065908 kernel: Key type fscrypt-provisioning registered Sep 6 00:30:13.065921 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 00:30:13.065935 kernel: ima: Allocated hash algorithm: sha1 Sep 6 00:30:13.065948 kernel: ima: No architecture policies found Sep 6 00:30:13.065961 kernel: clk: Disabling unused clocks Sep 6 00:30:13.065975 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 00:30:13.065988 kernel: Write protecting the kernel read-only data: 28672k Sep 6 00:30:13.066006 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 00:30:13.066020 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 00:30:13.066033 kernel: Run /init as init process Sep 6 00:30:13.066047 kernel: with arguments: Sep 6 00:30:13.066061 kernel: /init Sep 6 00:30:13.066074 kernel: with environment: Sep 6 00:30:13.066087 kernel: HOME=/ Sep 6 00:30:13.066100 kernel: TERM=linux Sep 6 00:30:13.066114 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 00:30:13.066137 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:30:13.066162 systemd[1]: Detected virtualization kvm. Sep 6 00:30:13.066177 systemd[1]: Detected architecture x86-64. Sep 6 00:30:13.066191 systemd[1]: Running in initrd. Sep 6 00:30:13.066204 systemd[1]: No hostname configured, using default hostname. Sep 6 00:30:13.066218 systemd[1]: Hostname set to . Sep 6 00:30:13.066233 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:30:13.066247 systemd[1]: Queued start job for default target initrd.target. Sep 6 00:30:13.066265 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:30:13.066279 systemd[1]: Reached target cryptsetup.target. Sep 6 00:30:13.066294 systemd[1]: Reached target paths.target. Sep 6 00:30:13.066308 systemd[1]: Reached target slices.target. Sep 6 00:30:13.066322 systemd[1]: Reached target swap.target. Sep 6 00:30:13.066335 systemd[1]: Reached target timers.target. Sep 6 00:30:13.066350 systemd[1]: Listening on iscsid.socket. Sep 6 00:30:13.066369 systemd[1]: Listening on iscsiuio.socket. Sep 6 00:30:13.066400 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 00:30:13.066416 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 00:30:13.066431 systemd[1]: Listening on systemd-journald.socket. Sep 6 00:30:13.066445 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:30:13.066459 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:30:13.066473 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:30:13.066488 systemd[1]: Reached target sockets.target. Sep 6 00:30:13.066503 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:30:13.066522 systemd[1]: Finished network-cleanup.service. Sep 6 00:30:13.066537 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 00:30:13.066552 systemd[1]: Starting systemd-journald.service... Sep 6 00:30:13.066570 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:30:13.066585 systemd[1]: Starting systemd-resolved.service... Sep 6 00:30:13.066599 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 00:30:13.066613 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:30:13.066627 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 00:30:13.066661 systemd-journald[201]: Journal started Sep 6 00:30:13.066763 systemd-journald[201]: Runtime Journal (/run/log/journal/7a81891124a84bedbec15bb659007a55) is 4.7M, max 38.1M, 33.3M free. Sep 6 00:30:12.989507 systemd-modules-load[202]: Inserted module 'overlay' Sep 6 00:30:13.085847 kernel: Bridge firewalling registered Sep 6 00:30:13.042764 systemd-resolved[203]: Positive Trust Anchors: Sep 6 00:30:13.100041 systemd[1]: Started systemd-resolved.service. Sep 6 00:30:13.100087 kernel: audit: type=1130 audit(1757118613.086:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.100131 kernel: audit: type=1130 audit(1757118613.093:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.100151 systemd[1]: Started systemd-journald.service. Sep 6 00:30:13.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.042785 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:30:13.103318 kernel: SCSI subsystem initialized Sep 6 00:30:13.042832 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:30:13.117585 kernel: audit: type=1130 audit(1757118613.105:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.117630 kernel: audit: type=1130 audit(1757118613.111:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.047887 systemd-resolved[203]: Defaulting to hostname 'linux'. Sep 6 00:30:13.125850 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 00:30:13.125891 kernel: device-mapper: uevent: version 1.0.3 Sep 6 00:30:13.125910 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 00:30:13.073249 systemd-modules-load[202]: Inserted module 'br_netfilter' Sep 6 00:30:13.131585 kernel: audit: type=1130 audit(1757118613.125:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.106595 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 00:30:13.137499 kernel: audit: type=1130 audit(1757118613.131:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.112311 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 00:30:13.125252 systemd-modules-load[202]: Inserted module 'dm_multipath' Sep 6 00:30:13.126651 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:30:13.132543 systemd[1]: Reached target nss-lookup.target. Sep 6 00:30:13.139280 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 00:30:13.141834 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:30:13.143464 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:30:13.157349 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:30:13.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.164453 kernel: audit: type=1130 audit(1757118613.158:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.165514 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:30:13.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.172249 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 00:30:13.173636 kernel: audit: type=1130 audit(1757118613.166:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.174495 systemd[1]: Starting dracut-cmdline.service... Sep 6 00:30:13.193242 kernel: audit: type=1130 audit(1757118613.172:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.193281 dracut-cmdline[224]: dracut-dracut-053 Sep 6 00:30:13.193281 dracut-cmdline[224]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Sep 6 00:30:13.193281 dracut-cmdline[224]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:30:13.278419 kernel: Loading iSCSI transport class v2.0-870. Sep 6 00:30:13.300424 kernel: iscsi: registered transport (tcp) Sep 6 00:30:13.330158 kernel: iscsi: registered transport (qla4xxx) Sep 6 00:30:13.330273 kernel: QLogic iSCSI HBA Driver Sep 6 00:30:13.385941 systemd[1]: Finished dracut-cmdline.service. Sep 6 00:30:13.388239 systemd[1]: Starting dracut-pre-udev.service... Sep 6 00:30:13.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.450508 kernel: raid6: sse2x4 gen() 7647 MB/s Sep 6 00:30:13.468444 kernel: raid6: sse2x4 xor() 5080 MB/s Sep 6 00:30:13.486447 kernel: raid6: sse2x2 gen() 5479 MB/s Sep 6 00:30:13.504474 kernel: raid6: sse2x2 xor() 8031 MB/s Sep 6 00:30:13.522451 kernel: raid6: sse2x1 gen() 5408 MB/s Sep 6 00:30:13.541104 kernel: raid6: sse2x1 xor() 7223 MB/s Sep 6 00:30:13.541213 kernel: raid6: using algorithm sse2x4 gen() 7647 MB/s Sep 6 00:30:13.541233 kernel: raid6: .... xor() 5080 MB/s, rmw enabled Sep 6 00:30:13.542400 kernel: raid6: using ssse3x2 recovery algorithm Sep 6 00:30:13.560436 kernel: xor: automatically using best checksumming function avx Sep 6 00:30:13.677447 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 00:30:13.691955 systemd[1]: Finished dracut-pre-udev.service. Sep 6 00:30:13.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.692000 audit: BPF prog-id=7 op=LOAD Sep 6 00:30:13.693000 audit: BPF prog-id=8 op=LOAD Sep 6 00:30:13.694115 systemd[1]: Starting systemd-udevd.service... Sep 6 00:30:13.712846 systemd-udevd[402]: Using default interface naming scheme 'v252'. Sep 6 00:30:13.722240 systemd[1]: Started systemd-udevd.service. Sep 6 00:30:13.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.725131 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 00:30:13.744439 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Sep 6 00:30:13.792068 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 00:30:13.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.794100 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:30:13.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:13.886735 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:30:13.999409 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 00:30:13.999500 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Sep 6 00:30:14.051259 kernel: AVX version of gcm_enc/dec engaged. Sep 6 00:30:14.051298 kernel: AES CTR mode by8 optimization enabled Sep 6 00:30:14.051330 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 6 00:30:14.051355 kernel: GPT:17805311 != 125829119 Sep 6 00:30:14.051378 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 6 00:30:14.051419 kernel: GPT:17805311 != 125829119 Sep 6 00:30:14.051436 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 6 00:30:14.051454 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:30:14.057406 kernel: ACPI: bus type USB registered Sep 6 00:30:14.058422 kernel: usbcore: registered new interface driver usbfs Sep 6 00:30:14.058457 kernel: usbcore: registered new interface driver hub Sep 6 00:30:14.058476 kernel: usbcore: registered new device driver usb Sep 6 00:30:14.061405 kernel: libata version 3.00 loaded. Sep 6 00:30:14.093417 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (449) Sep 6 00:30:14.095188 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 00:30:14.213405 kernel: ahci 0000:00:1f.2: version 3.0 Sep 6 00:30:14.213818 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Sep 6 00:30:14.213842 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Sep 6 00:30:14.214042 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Sep 6 00:30:14.214218 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 00:30:14.214436 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Sep 6 00:30:14.214618 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Sep 6 00:30:14.214814 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 00:30:14.214992 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Sep 6 00:30:14.215178 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Sep 6 00:30:14.215357 kernel: hub 1-0:1.0: USB hub found Sep 6 00:30:14.215597 kernel: hub 1-0:1.0: 4 ports detected Sep 6 00:30:14.215808 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Sep 6 00:30:14.216103 kernel: hub 2-0:1.0: USB hub found Sep 6 00:30:14.216325 kernel: hub 2-0:1.0: 4 ports detected Sep 6 00:30:14.216560 kernel: scsi host0: ahci Sep 6 00:30:14.216806 kernel: scsi host1: ahci Sep 6 00:30:14.217001 kernel: scsi host2: ahci Sep 6 00:30:14.217194 kernel: scsi host3: ahci Sep 6 00:30:14.217408 kernel: scsi host4: ahci Sep 6 00:30:14.217600 kernel: scsi host5: ahci Sep 6 00:30:14.217813 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Sep 6 00:30:14.217835 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Sep 6 00:30:14.217868 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Sep 6 00:30:14.217888 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Sep 6 00:30:14.217906 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Sep 6 00:30:14.217923 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Sep 6 00:30:14.214059 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 00:30:14.223472 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 00:30:14.228926 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 00:30:14.239079 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:30:14.241333 systemd[1]: Starting disk-uuid.service... Sep 6 00:30:14.248531 disk-uuid[529]: Primary Header is updated. Sep 6 00:30:14.248531 disk-uuid[529]: Secondary Entries is updated. Sep 6 00:30:14.248531 disk-uuid[529]: Secondary Header is updated. Sep 6 00:30:14.253407 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:30:14.260426 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:30:14.266441 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:30:14.375413 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Sep 6 00:30:14.459469 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 6 00:30:14.463072 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 6 00:30:14.463117 kernel: ata1: SATA link down (SStatus 0 SControl 300) Sep 6 00:30:14.464724 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 6 00:30:14.466380 kernel: ata2: SATA link down (SStatus 0 SControl 300) Sep 6 00:30:14.468405 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 6 00:30:14.517430 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 00:30:14.524841 kernel: usbcore: registered new interface driver usbhid Sep 6 00:30:14.524880 kernel: usbhid: USB HID core driver Sep 6 00:30:14.534617 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Sep 6 00:30:14.534664 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Sep 6 00:30:15.265416 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:30:15.265769 disk-uuid[530]: The operation has completed successfully. Sep 6 00:30:15.326487 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 00:30:15.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.326655 systemd[1]: Finished disk-uuid.service. Sep 6 00:30:15.333415 systemd[1]: Starting verity-setup.service... Sep 6 00:30:15.353416 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Sep 6 00:30:15.410244 systemd[1]: Found device dev-mapper-usr.device. Sep 6 00:30:15.413183 systemd[1]: Mounting sysusr-usr.mount... Sep 6 00:30:15.416468 systemd[1]: Finished verity-setup.service. Sep 6 00:30:15.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.509468 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 00:30:15.510251 systemd[1]: Mounted sysusr-usr.mount. Sep 6 00:30:15.511185 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 00:30:15.512359 systemd[1]: Starting ignition-setup.service... Sep 6 00:30:15.514264 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 00:30:15.533442 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:30:15.533527 kernel: BTRFS info (device vda6): using free space tree Sep 6 00:30:15.533549 kernel: BTRFS info (device vda6): has skinny extents Sep 6 00:30:15.554160 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 00:30:15.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.563102 systemd[1]: Finished ignition-setup.service. Sep 6 00:30:15.565148 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 00:30:15.683078 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 00:30:15.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.685000 audit: BPF prog-id=9 op=LOAD Sep 6 00:30:15.686358 systemd[1]: Starting systemd-networkd.service... Sep 6 00:30:15.732265 ignition[627]: Ignition 2.14.0 Sep 6 00:30:15.732297 ignition[627]: Stage: fetch-offline Sep 6 00:30:15.733517 systemd-networkd[711]: lo: Link UP Sep 6 00:30:15.732450 ignition[627]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:30:15.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.733529 systemd-networkd[711]: lo: Gained carrier Sep 6 00:30:15.732510 ignition[627]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:30:15.734612 systemd-networkd[711]: Enumeration completed Sep 6 00:30:15.738565 ignition[627]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:30:15.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.735024 systemd-networkd[711]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:30:15.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.738894 ignition[627]: parsed url from cmdline: "" Sep 6 00:30:15.736913 systemd-networkd[711]: eth0: Link UP Sep 6 00:30:15.738903 ignition[627]: no config URL provided Sep 6 00:30:15.736920 systemd-networkd[711]: eth0: Gained carrier Sep 6 00:30:15.738914 ignition[627]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:30:15.737456 systemd[1]: Started systemd-networkd.service. Sep 6 00:30:15.738931 ignition[627]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:30:15.739911 systemd[1]: Reached target network.target. Sep 6 00:30:15.738962 ignition[627]: failed to fetch config: resource requires networking Sep 6 00:30:15.772956 iscsid[717]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:30:15.772956 iscsid[717]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 00:30:15.772956 iscsid[717]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 00:30:15.772956 iscsid[717]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 00:30:15.772956 iscsid[717]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:30:15.772956 iscsid[717]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 00:30:15.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.741911 systemd[1]: Starting iscsiuio.service... Sep 6 00:30:15.752854 ignition[627]: Ignition finished successfully Sep 6 00:30:15.757831 systemd[1]: Started iscsiuio.service. Sep 6 00:30:15.785818 ignition[716]: Ignition 2.14.0 Sep 6 00:30:15.759197 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 00:30:15.785831 ignition[716]: Stage: fetch Sep 6 00:30:15.761994 systemd[1]: Starting ignition-fetch.service... Sep 6 00:30:15.786010 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:30:15.765306 systemd[1]: Starting iscsid.service... Sep 6 00:30:15.786061 ignition[716]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:30:15.775618 systemd[1]: Started iscsid.service. Sep 6 00:30:15.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.793855 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:30:15.776627 systemd-networkd[711]: eth0: DHCPv4 address 10.244.26.66/30, gateway 10.244.26.65 acquired from 10.244.26.65 Sep 6 00:30:15.794006 ignition[716]: parsed url from cmdline: "" Sep 6 00:30:15.779655 systemd[1]: Starting dracut-initqueue.service... Sep 6 00:30:15.794014 ignition[716]: no config URL provided Sep 6 00:30:15.797834 systemd[1]: Finished dracut-initqueue.service. Sep 6 00:30:15.794025 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:30:15.798993 systemd[1]: Reached target remote-fs-pre.target. Sep 6 00:30:15.794042 ignition[716]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:30:15.800741 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:30:15.799935 ignition[716]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Sep 6 00:30:15.803402 systemd[1]: Reached target remote-fs.target. Sep 6 00:30:15.800306 ignition[716]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Sep 6 00:30:15.802848 ignition[716]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Sep 6 00:30:15.810989 systemd[1]: Starting dracut-pre-mount.service... Sep 6 00:30:15.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.823367 systemd[1]: Finished dracut-pre-mount.service. Sep 6 00:30:15.828537 ignition[716]: GET result: OK Sep 6 00:30:15.828652 ignition[716]: parsing config with SHA512: 49b99bcb6853f7d7bee65784ed9504d45161e2ce786bb26425b28f46fc6b76f5975230ae91a9aa57f5641cf3d7732f9453166af7d3bbfc92003fc3ba1c2663a7 Sep 6 00:30:15.836132 unknown[716]: fetched base config from "system" Sep 6 00:30:15.836154 unknown[716]: fetched base config from "system" Sep 6 00:30:15.837247 ignition[716]: fetch: fetch complete Sep 6 00:30:15.836169 unknown[716]: fetched user config from "openstack" Sep 6 00:30:15.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.837257 ignition[716]: fetch: fetch passed Sep 6 00:30:15.841548 systemd[1]: Finished ignition-fetch.service. Sep 6 00:30:15.837336 ignition[716]: Ignition finished successfully Sep 6 00:30:15.843579 systemd[1]: Starting ignition-kargs.service... Sep 6 00:30:15.858188 ignition[736]: Ignition 2.14.0 Sep 6 00:30:15.858210 ignition[736]: Stage: kargs Sep 6 00:30:15.858458 ignition[736]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:30:15.858499 ignition[736]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:30:15.859858 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:30:15.861047 ignition[736]: kargs: kargs passed Sep 6 00:30:15.862961 systemd[1]: Finished ignition-kargs.service. Sep 6 00:30:15.861125 ignition[736]: Ignition finished successfully Sep 6 00:30:15.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.865000 systemd[1]: Starting ignition-disks.service... Sep 6 00:30:15.876744 ignition[741]: Ignition 2.14.0 Sep 6 00:30:15.876767 ignition[741]: Stage: disks Sep 6 00:30:15.876952 ignition[741]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:30:15.876992 ignition[741]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:30:15.878321 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:30:15.879553 ignition[741]: disks: disks passed Sep 6 00:30:15.881194 systemd[1]: Finished ignition-disks.service. Sep 6 00:30:15.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.879631 ignition[741]: Ignition finished successfully Sep 6 00:30:15.882346 systemd[1]: Reached target initrd-root-device.target. Sep 6 00:30:15.883469 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:30:15.884742 systemd[1]: Reached target local-fs.target. Sep 6 00:30:15.885998 systemd[1]: Reached target sysinit.target. Sep 6 00:30:15.887197 systemd[1]: Reached target basic.target. Sep 6 00:30:15.889799 systemd[1]: Starting systemd-fsck-root.service... Sep 6 00:30:15.914201 systemd-fsck[749]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 6 00:30:15.922823 systemd[1]: Finished systemd-fsck-root.service. Sep 6 00:30:15.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:15.924809 systemd[1]: Mounting sysroot.mount... Sep 6 00:30:15.939417 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 00:30:15.940255 systemd[1]: Mounted sysroot.mount. Sep 6 00:30:15.941931 systemd[1]: Reached target initrd-root-fs.target. Sep 6 00:30:15.945015 systemd[1]: Mounting sysroot-usr.mount... Sep 6 00:30:15.947067 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 6 00:30:15.949153 systemd[1]: Starting flatcar-openstack-hostname.service... Sep 6 00:30:15.950770 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 00:30:15.951829 systemd[1]: Reached target ignition-diskful.target. Sep 6 00:30:15.955619 systemd[1]: Mounted sysroot-usr.mount. Sep 6 00:30:15.958984 systemd[1]: Starting initrd-setup-root.service... Sep 6 00:30:15.970265 initrd-setup-root[760]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 00:30:15.984540 initrd-setup-root[768]: cut: /sysroot/etc/group: No such file or directory Sep 6 00:30:15.992911 initrd-setup-root[776]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 00:30:16.003492 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 00:30:16.070125 systemd[1]: Finished initrd-setup-root.service. Sep 6 00:30:16.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:16.072224 systemd[1]: Starting ignition-mount.service... Sep 6 00:30:16.073910 systemd[1]: Starting sysroot-boot.service... Sep 6 00:30:16.085679 bash[803]: umount: /sysroot/usr/share/oem: not mounted. Sep 6 00:30:16.101602 ignition[804]: INFO : Ignition 2.14.0 Sep 6 00:30:16.101602 ignition[804]: INFO : Stage: mount Sep 6 00:30:16.103438 ignition[804]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:30:16.103438 ignition[804]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:30:16.103438 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:30:16.107250 ignition[804]: INFO : mount: mount passed Sep 6 00:30:16.107250 ignition[804]: INFO : Ignition finished successfully Sep 6 00:30:16.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:16.106349 systemd[1]: Finished ignition-mount.service. Sep 6 00:30:16.119611 coreos-metadata[755]: Sep 06 00:30:16.119 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Sep 6 00:30:16.127320 systemd[1]: Finished sysroot-boot.service. Sep 6 00:30:16.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:16.139229 coreos-metadata[755]: Sep 06 00:30:16.138 INFO Fetch successful Sep 6 00:30:16.140730 coreos-metadata[755]: Sep 06 00:30:16.140 INFO wrote hostname srv-iwke2.gb1.brightbox.com to /sysroot/etc/hostname Sep 6 00:30:16.145089 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Sep 6 00:30:16.145270 systemd[1]: Finished flatcar-openstack-hostname.service. Sep 6 00:30:16.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:16.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:16.436671 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:30:16.456416 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (812) Sep 6 00:30:16.461427 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:30:16.461542 kernel: BTRFS info (device vda6): using free space tree Sep 6 00:30:16.461562 kernel: BTRFS info (device vda6): has skinny extents Sep 6 00:30:16.471021 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:30:16.474914 systemd[1]: Starting ignition-files.service... Sep 6 00:30:16.501837 ignition[832]: INFO : Ignition 2.14.0 Sep 6 00:30:16.501837 ignition[832]: INFO : Stage: files Sep 6 00:30:16.503770 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:30:16.503770 ignition[832]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:30:16.503770 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:30:16.506933 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Sep 6 00:30:16.506933 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 00:30:16.506933 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 00:30:16.510930 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 00:30:16.512482 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 00:30:16.514908 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 00:30:16.514908 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 6 00:30:16.514908 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 00:30:16.513424 unknown[832]: wrote ssh authorized keys file for user: core Sep 6 00:30:16.520327 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:30:16.520327 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:30:16.520327 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:30:16.520327 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:30:16.520327 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:30:16.520327 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Sep 6 00:30:16.864396 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Sep 6 00:30:17.579836 systemd-networkd[711]: eth0: Gained IPv6LL Sep 6 00:30:18.134778 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:30:18.139584 ignition[832]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:30:18.139584 ignition[832]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:30:18.139584 ignition[832]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:30:18.139584 ignition[832]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:30:18.148505 ignition[832]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:30:18.148505 ignition[832]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:30:18.148505 ignition[832]: INFO : files: files passed Sep 6 00:30:18.148505 ignition[832]: INFO : Ignition finished successfully Sep 6 00:30:18.162593 kernel: kauditd_printk_skb: 28 callbacks suppressed Sep 6 00:30:18.162650 kernel: audit: type=1130 audit(1757118618.151:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.150941 systemd[1]: Finished ignition-files.service. Sep 6 00:30:18.154817 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 00:30:18.161844 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 00:30:18.181350 kernel: audit: type=1130 audit(1757118618.169:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.181464 kernel: audit: type=1131 audit(1757118618.169:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.163257 systemd[1]: Starting ignition-quench.service... Sep 6 00:30:18.187977 kernel: audit: type=1130 audit(1757118618.181:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.188126 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 00:30:18.168787 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 00:30:18.168951 systemd[1]: Finished ignition-quench.service. Sep 6 00:30:18.175718 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 00:30:18.182436 systemd[1]: Reached target ignition-complete.target. Sep 6 00:30:18.189951 systemd[1]: Starting initrd-parse-etc.service... Sep 6 00:30:18.212659 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 00:30:18.212843 systemd[1]: Finished initrd-parse-etc.service. Sep 6 00:30:18.224680 kernel: audit: type=1130 audit(1757118618.213:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.224756 kernel: audit: type=1131 audit(1757118618.214:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.214658 systemd[1]: Reached target initrd-fs.target. Sep 6 00:30:18.225258 systemd[1]: Reached target initrd.target. Sep 6 00:30:18.226598 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 00:30:18.227996 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 00:30:18.254281 kernel: audit: type=1130 audit(1757118618.246:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.246270 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 00:30:18.248259 systemd[1]: Starting initrd-cleanup.service... Sep 6 00:30:18.262169 systemd[1]: Stopped target nss-lookup.target. Sep 6 00:30:18.263212 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 00:30:18.264852 systemd[1]: Stopped target timers.target. Sep 6 00:30:18.266129 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 00:30:18.266318 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 00:30:18.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.269416 systemd[1]: Stopped target initrd.target. Sep 6 00:30:18.292154 kernel: audit: type=1131 audit(1757118618.268:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.292211 kernel: audit: type=1131 audit(1757118618.281:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.270135 systemd[1]: Stopped target basic.target. Sep 6 00:30:18.270859 systemd[1]: Stopped target ignition-complete.target. Sep 6 00:30:18.300460 kernel: audit: type=1131 audit(1757118618.293:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.271613 systemd[1]: Stopped target ignition-diskful.target. Sep 6 00:30:18.272609 systemd[1]: Stopped target initrd-root-device.target. Sep 6 00:30:18.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.273353 systemd[1]: Stopped target remote-fs.target. Sep 6 00:30:18.274109 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 00:30:18.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.274890 systemd[1]: Stopped target sysinit.target. Sep 6 00:30:18.275647 systemd[1]: Stopped target local-fs.target. Sep 6 00:30:18.276336 systemd[1]: Stopped target local-fs-pre.target. Sep 6 00:30:18.277091 systemd[1]: Stopped target swap.target. Sep 6 00:30:18.277749 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 00:30:18.277929 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 00:30:18.323938 ignition[870]: INFO : Ignition 2.14.0 Sep 6 00:30:18.323938 ignition[870]: INFO : Stage: umount Sep 6 00:30:18.323938 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:30:18.323938 ignition[870]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:30:18.323938 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:30:18.323938 ignition[870]: INFO : umount: umount passed Sep 6 00:30:18.323938 ignition[870]: INFO : Ignition finished successfully Sep 6 00:30:18.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.281822 systemd[1]: Stopped target cryptsetup.target. Sep 6 00:30:18.292903 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 00:30:18.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.293094 systemd[1]: Stopped dracut-initqueue.service. Sep 6 00:30:18.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.294235 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 00:30:18.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.294444 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 00:30:18.301582 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 00:30:18.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.301864 systemd[1]: Stopped ignition-files.service. Sep 6 00:30:18.305125 systemd[1]: Stopping ignition-mount.service... Sep 6 00:30:18.324783 systemd[1]: Stopping sysroot-boot.service... Sep 6 00:30:18.325655 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 00:30:18.325884 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 00:30:18.333235 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 00:30:18.333440 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 00:30:18.336450 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 00:30:18.336598 systemd[1]: Stopped ignition-mount.service. Sep 6 00:30:18.338631 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 00:30:18.338788 systemd[1]: Stopped ignition-disks.service. Sep 6 00:30:18.340496 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 00:30:18.340593 systemd[1]: Stopped ignition-kargs.service. Sep 6 00:30:18.341608 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 00:30:18.341686 systemd[1]: Stopped ignition-fetch.service. Sep 6 00:30:18.342918 systemd[1]: Stopped target network.target. Sep 6 00:30:18.344354 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 00:30:18.344479 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 00:30:18.345860 systemd[1]: Stopped target paths.target. Sep 6 00:30:18.347031 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 00:30:18.350452 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 00:30:18.351158 systemd[1]: Stopped target slices.target. Sep 6 00:30:18.352487 systemd[1]: Stopped target sockets.target. Sep 6 00:30:18.353834 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 00:30:18.353889 systemd[1]: Closed iscsid.socket. Sep 6 00:30:18.355093 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 00:30:18.355146 systemd[1]: Closed iscsiuio.socket. Sep 6 00:30:18.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.367350 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 00:30:18.367482 systemd[1]: Stopped ignition-setup.service. Sep 6 00:30:18.369478 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:30:18.370268 systemd[1]: Stopping systemd-resolved.service... Sep 6 00:30:18.372462 systemd-networkd[711]: eth0: DHCPv6 lease lost Sep 6 00:30:18.374749 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 00:30:18.376221 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:30:18.376413 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:30:18.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.378993 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 00:30:18.379138 systemd[1]: Finished initrd-cleanup.service. Sep 6 00:30:18.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.382575 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 00:30:18.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.382743 systemd[1]: Stopped systemd-resolved.service. Sep 6 00:30:18.384000 audit: BPF prog-id=9 op=UNLOAD Sep 6 00:30:18.384000 audit: BPF prog-id=6 op=UNLOAD Sep 6 00:30:18.385363 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 00:30:18.385441 systemd[1]: Closed systemd-networkd.socket. Sep 6 00:30:18.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.387868 systemd[1]: Stopping network-cleanup.service... Sep 6 00:30:18.388525 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 00:30:18.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.388598 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 00:30:18.389307 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 00:30:18.389372 systemd[1]: Stopped systemd-sysctl.service. Sep 6 00:30:18.390438 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 00:30:18.390500 systemd[1]: Stopped systemd-modules-load.service. Sep 6 00:30:18.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.392109 systemd[1]: Stopping systemd-udevd.service... Sep 6 00:30:18.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.400785 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 00:30:18.404820 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 00:30:18.404998 systemd[1]: Stopped network-cleanup.service. Sep 6 00:30:18.406697 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 00:30:18.406908 systemd[1]: Stopped systemd-udevd.service. Sep 6 00:30:18.410180 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 00:30:18.410248 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 00:30:18.413706 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 00:30:18.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.413787 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 00:30:18.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.415064 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 00:30:18.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.415144 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 00:30:18.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.416414 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 00:30:18.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.416483 systemd[1]: Stopped dracut-cmdline.service. Sep 6 00:30:18.417833 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 00:30:18.417913 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 00:30:18.420529 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 00:30:18.425524 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 00:30:18.425726 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 00:30:18.426570 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 00:30:18.426651 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 00:30:18.427294 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 00:30:18.427355 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 00:30:18.430357 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 00:30:18.431209 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 00:30:18.431356 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 00:30:18.584909 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 00:30:18.585088 systemd[1]: Stopped sysroot-boot.service. Sep 6 00:30:18.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.586793 systemd[1]: Reached target initrd-switch-root.target. Sep 6 00:30:18.587792 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 00:30:18.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:18.587898 systemd[1]: Stopped initrd-setup-root.service. Sep 6 00:30:18.590944 systemd[1]: Starting initrd-switch-root.service... Sep 6 00:30:18.609311 systemd[1]: Switching root. Sep 6 00:30:18.634421 iscsid[717]: iscsid shutting down. Sep 6 00:30:18.635236 systemd-journald[201]: Journal stopped Sep 6 00:30:22.797092 systemd-journald[201]: Received SIGTERM from PID 1 (n/a). Sep 6 00:30:22.797240 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 00:30:22.797269 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 00:30:22.797291 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 00:30:22.797312 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 00:30:22.797343 kernel: SELinux: policy capability open_perms=1 Sep 6 00:30:22.797390 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 00:30:22.797417 kernel: SELinux: policy capability always_check_network=0 Sep 6 00:30:22.797439 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 00:30:22.797469 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 00:30:22.797491 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 00:30:22.797512 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 00:30:22.797534 systemd[1]: Successfully loaded SELinux policy in 62.149ms. Sep 6 00:30:22.797588 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.297ms. Sep 6 00:30:22.797625 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:30:22.797663 systemd[1]: Detected virtualization kvm. Sep 6 00:30:22.797687 systemd[1]: Detected architecture x86-64. Sep 6 00:30:22.797709 systemd[1]: Detected first boot. Sep 6 00:30:22.797731 systemd[1]: Hostname set to . Sep 6 00:30:22.797752 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:30:22.797774 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 00:30:22.797795 systemd[1]: Populated /etc with preset unit settings. Sep 6 00:30:22.797837 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:30:22.797865 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:30:22.797891 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:30:22.797915 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 00:30:22.797957 systemd[1]: Stopped iscsiuio.service. Sep 6 00:30:22.797981 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 00:30:22.798002 systemd[1]: Stopped iscsid.service. Sep 6 00:30:22.798039 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 00:30:22.801510 systemd[1]: Stopped initrd-switch-root.service. Sep 6 00:30:22.801553 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 00:30:22.801581 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 00:30:22.801604 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 00:30:22.801627 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 6 00:30:22.801649 systemd[1]: Created slice system-getty.slice. Sep 6 00:30:22.801689 systemd[1]: Created slice system-modprobe.slice. Sep 6 00:30:22.806863 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 00:30:22.806896 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 00:30:22.806920 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 00:30:22.806944 systemd[1]: Created slice user.slice. Sep 6 00:30:22.806987 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:30:22.807012 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 00:30:22.807035 systemd[1]: Set up automount boot.automount. Sep 6 00:30:22.807057 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 00:30:22.807079 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 00:30:22.807102 systemd[1]: Stopped target initrd-fs.target. Sep 6 00:30:22.807141 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 00:30:22.807165 systemd[1]: Reached target integritysetup.target. Sep 6 00:30:22.807188 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:30:22.807225 systemd[1]: Reached target remote-fs.target. Sep 6 00:30:22.807249 systemd[1]: Reached target slices.target. Sep 6 00:30:22.807271 systemd[1]: Reached target swap.target. Sep 6 00:30:22.807293 systemd[1]: Reached target torcx.target. Sep 6 00:30:22.807316 systemd[1]: Reached target veritysetup.target. Sep 6 00:30:22.807338 systemd[1]: Listening on systemd-coredump.socket. Sep 6 00:30:22.807359 systemd[1]: Listening on systemd-initctl.socket. Sep 6 00:30:22.807446 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:30:22.807477 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:30:22.807523 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:30:22.807564 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 00:30:22.807588 systemd[1]: Mounting dev-hugepages.mount... Sep 6 00:30:22.807612 systemd[1]: Mounting dev-mqueue.mount... Sep 6 00:30:22.807634 systemd[1]: Mounting media.mount... Sep 6 00:30:22.807657 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:30:22.807679 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 00:30:22.807701 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 00:30:22.807723 systemd[1]: Mounting tmp.mount... Sep 6 00:30:22.807760 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 00:30:22.807785 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:30:22.807807 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:30:22.807829 systemd[1]: Starting modprobe@configfs.service... Sep 6 00:30:22.807850 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:30:22.807873 systemd[1]: Starting modprobe@drm.service... Sep 6 00:30:22.807894 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:30:22.807916 systemd[1]: Starting modprobe@fuse.service... Sep 6 00:30:22.807962 systemd[1]: Starting modprobe@loop.service... Sep 6 00:30:22.808000 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 00:30:22.808037 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 00:30:22.808070 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 00:30:22.808094 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 00:30:22.808117 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 00:30:22.808153 systemd[1]: Stopped systemd-journald.service. Sep 6 00:30:22.808176 systemd[1]: Starting systemd-journald.service... Sep 6 00:30:22.808205 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:30:22.808228 systemd[1]: Starting systemd-network-generator.service... Sep 6 00:30:22.808263 systemd[1]: Starting systemd-remount-fs.service... Sep 6 00:30:22.808288 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:30:22.808310 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 00:30:22.808333 systemd[1]: Stopped verity-setup.service. Sep 6 00:30:22.808355 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:30:22.808378 systemd[1]: Mounted dev-hugepages.mount. Sep 6 00:30:22.808455 systemd[1]: Mounted dev-mqueue.mount. Sep 6 00:30:22.808478 systemd[1]: Mounted media.mount. Sep 6 00:30:22.808500 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 00:30:22.808549 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 00:30:22.808576 systemd[1]: Mounted tmp.mount. Sep 6 00:30:22.808615 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:30:22.808640 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 00:30:22.808663 systemd[1]: Finished modprobe@configfs.service. Sep 6 00:30:22.808700 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:30:22.808724 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:30:22.808746 kernel: fuse: init (API version 7.34) Sep 6 00:30:22.808769 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:30:22.808792 systemd[1]: Finished modprobe@drm.service. Sep 6 00:30:22.808814 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:30:22.808835 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:30:22.808857 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 00:30:22.808891 systemd-journald[976]: Journal started Sep 6 00:30:22.809012 systemd-journald[976]: Runtime Journal (/run/log/journal/7a81891124a84bedbec15bb659007a55) is 4.7M, max 38.1M, 33.3M free. Sep 6 00:30:18.807000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:30:18.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:30:18.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:30:18.895000 audit: BPF prog-id=10 op=LOAD Sep 6 00:30:18.895000 audit: BPF prog-id=10 op=UNLOAD Sep 6 00:30:22.813155 systemd[1]: Finished modprobe@fuse.service. Sep 6 00:30:22.813206 kernel: loop: module loaded Sep 6 00:30:22.813258 systemd[1]: Started systemd-journald.service. Sep 6 00:30:18.895000 audit: BPF prog-id=11 op=LOAD Sep 6 00:30:18.895000 audit: BPF prog-id=11 op=UNLOAD Sep 6 00:30:19.040000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:30:19.040000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d88c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:19.040000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:30:19.044000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 00:30:19.044000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d965 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:19.044000 audit: CWD cwd="/" Sep 6 00:30:19.044000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:19.044000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:19.044000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:30:22.516000 audit: BPF prog-id=12 op=LOAD Sep 6 00:30:22.516000 audit: BPF prog-id=3 op=UNLOAD Sep 6 00:30:22.516000 audit: BPF prog-id=13 op=LOAD Sep 6 00:30:22.516000 audit: BPF prog-id=14 op=LOAD Sep 6 00:30:22.516000 audit: BPF prog-id=4 op=UNLOAD Sep 6 00:30:22.516000 audit: BPF prog-id=5 op=UNLOAD Sep 6 00:30:22.518000 audit: BPF prog-id=15 op=LOAD Sep 6 00:30:22.518000 audit: BPF prog-id=12 op=UNLOAD Sep 6 00:30:22.518000 audit: BPF prog-id=16 op=LOAD Sep 6 00:30:22.518000 audit: BPF prog-id=17 op=LOAD Sep 6 00:30:22.518000 audit: BPF prog-id=13 op=UNLOAD Sep 6 00:30:22.518000 audit: BPF prog-id=14 op=UNLOAD Sep 6 00:30:22.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.528000 audit: BPF prog-id=15 op=UNLOAD Sep 6 00:30:22.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.709000 audit: BPF prog-id=18 op=LOAD Sep 6 00:30:22.709000 audit: BPF prog-id=19 op=LOAD Sep 6 00:30:22.709000 audit: BPF prog-id=20 op=LOAD Sep 6 00:30:22.709000 audit: BPF prog-id=16 op=UNLOAD Sep 6 00:30:22.709000 audit: BPF prog-id=17 op=UNLOAD Sep 6 00:30:22.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.787000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 00:30:22.787000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff5f8791c0 a2=4000 a3=7fff5f87925c items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:22.787000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 00:30:22.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:19.031843 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:30:22.510865 systemd[1]: Queued start job for default target multi-user.target. Sep 6 00:30:19.032590 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:30:22.510891 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 6 00:30:19.032660 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:30:22.521160 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 00:30:19.032720 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 00:30:19.032739 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 00:30:19.032795 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 00:30:19.032818 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 00:30:19.033201 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 00:30:19.033277 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:30:19.033305 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:30:19.038932 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 00:30:19.039002 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 00:30:22.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:19.039041 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 00:30:22.831429 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:30:19.039069 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 00:30:22.831706 systemd[1]: Finished modprobe@loop.service. Sep 6 00:30:22.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:19.039106 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 00:30:22.832801 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:30:19.039133 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 00:30:22.833866 systemd[1]: Finished systemd-network-generator.service. Sep 6 00:30:21.899746 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:30:22.835101 systemd[1]: Finished systemd-remount-fs.service. Sep 6 00:30:21.900576 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:30:22.836875 systemd[1]: Reached target network-pre.target. Sep 6 00:30:21.900835 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:30:21.901279 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:30:21.901435 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 00:30:21.901610 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-09-06T00:30:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 00:30:22.839713 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 00:30:22.848644 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 00:30:22.849358 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 00:30:22.853884 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 00:30:22.856259 systemd[1]: Starting systemd-journal-flush.service... Sep 6 00:30:22.857091 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:30:22.859254 systemd[1]: Starting systemd-random-seed.service... Sep 6 00:30:22.860970 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:30:22.863026 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:30:22.867281 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 00:30:22.869753 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 00:30:22.878796 systemd[1]: Finished systemd-random-seed.service. Sep 6 00:30:22.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.879808 systemd[1]: Reached target first-boot-complete.target. Sep 6 00:30:22.883687 systemd-journald[976]: Time spent on flushing to /var/log/journal/7a81891124a84bedbec15bb659007a55 is 86.644ms for 1276 entries. Sep 6 00:30:22.883687 systemd-journald[976]: System Journal (/var/log/journal/7a81891124a84bedbec15bb659007a55) is 8.0M, max 584.8M, 576.8M free. Sep 6 00:30:22.991407 systemd-journald[976]: Received client request to flush runtime journal. Sep 6 00:30:22.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:22.892228 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 00:30:22.895161 systemd[1]: Starting systemd-sysusers.service... Sep 6 00:30:22.932366 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:30:22.949036 systemd[1]: Finished systemd-sysusers.service. Sep 6 00:30:22.952650 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:30:22.993282 systemd[1]: Finished systemd-journal-flush.service. Sep 6 00:30:22.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.011419 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:30:23.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.035299 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:30:23.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.038250 systemd[1]: Starting systemd-udev-settle.service... Sep 6 00:30:23.051451 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 6 00:30:23.607033 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 00:30:23.615001 kernel: kauditd_printk_skb: 102 callbacks suppressed Sep 6 00:30:23.615239 kernel: audit: type=1130 audit(1757118623.607:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.614000 audit: BPF prog-id=21 op=LOAD Sep 6 00:30:23.617431 kernel: audit: type=1334 audit(1757118623.614:143): prog-id=21 op=LOAD Sep 6 00:30:23.614000 audit: BPF prog-id=22 op=LOAD Sep 6 00:30:23.614000 audit: BPF prog-id=7 op=UNLOAD Sep 6 00:30:23.620128 systemd[1]: Starting systemd-udevd.service... Sep 6 00:30:23.621457 kernel: audit: type=1334 audit(1757118623.614:144): prog-id=22 op=LOAD Sep 6 00:30:23.621558 kernel: audit: type=1334 audit(1757118623.614:145): prog-id=7 op=UNLOAD Sep 6 00:30:23.621612 kernel: audit: type=1334 audit(1757118623.614:146): prog-id=8 op=UNLOAD Sep 6 00:30:23.614000 audit: BPF prog-id=8 op=UNLOAD Sep 6 00:30:23.648291 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Sep 6 00:30:23.691392 systemd[1]: Started systemd-udevd.service. Sep 6 00:30:23.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.703429 kernel: audit: type=1130 audit(1757118623.691:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.703703 systemd[1]: Starting systemd-networkd.service... Sep 6 00:30:23.693000 audit: BPF prog-id=23 op=LOAD Sep 6 00:30:23.710404 kernel: audit: type=1334 audit(1757118623.693:148): prog-id=23 op=LOAD Sep 6 00:30:23.714000 audit: BPF prog-id=24 op=LOAD Sep 6 00:30:23.714000 audit: BPF prog-id=25 op=LOAD Sep 6 00:30:23.720084 kernel: audit: type=1334 audit(1757118623.714:149): prog-id=24 op=LOAD Sep 6 00:30:23.720167 kernel: audit: type=1334 audit(1757118623.714:150): prog-id=25 op=LOAD Sep 6 00:30:23.720414 systemd[1]: Starting systemd-userdbd.service... Sep 6 00:30:23.715000 audit: BPF prog-id=26 op=LOAD Sep 6 00:30:23.723417 kernel: audit: type=1334 audit(1757118623.715:151): prog-id=26 op=LOAD Sep 6 00:30:23.771396 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 00:30:23.785799 systemd[1]: Started systemd-userdbd.service. Sep 6 00:30:23.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.901415 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 00:30:23.911269 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:30:23.915322 systemd-networkd[1029]: lo: Link UP Sep 6 00:30:23.915336 systemd-networkd[1029]: lo: Gained carrier Sep 6 00:30:23.916260 systemd-networkd[1029]: Enumeration completed Sep 6 00:30:23.916422 systemd[1]: Started systemd-networkd.service. Sep 6 00:30:23.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:23.917723 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:30:23.919955 systemd-networkd[1029]: eth0: Link UP Sep 6 00:30:23.919969 systemd-networkd[1029]: eth0: Gained carrier Sep 6 00:30:23.947487 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Sep 6 00:30:23.951775 systemd-networkd[1029]: eth0: DHCPv4 address 10.244.26.66/30, gateway 10.244.26.65 acquired from 10.244.26.65 Sep 6 00:30:23.978439 kernel: ACPI: button: Power Button [PWRF] Sep 6 00:30:23.995000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 00:30:23.995000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558bd208fde0 a1=338ec a2=7fd32df91bc5 a3=5 items=110 ppid=1016 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:23.995000 audit: CWD cwd="/" Sep 6 00:30:23.995000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=1 name=(null) inode=15969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=2 name=(null) inode=15969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=3 name=(null) inode=15970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=4 name=(null) inode=15969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=5 name=(null) inode=15971 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=6 name=(null) inode=15969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=7 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=8 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=9 name=(null) inode=15973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=10 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=11 name=(null) inode=15974 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=12 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=13 name=(null) inode=15975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=14 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=15 name=(null) inode=15976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=16 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=17 name=(null) inode=15977 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=18 name=(null) inode=15969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=19 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=20 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=21 name=(null) inode=15979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=22 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=23 name=(null) inode=15980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=24 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=25 name=(null) inode=15981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=26 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=27 name=(null) inode=15982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=28 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=29 name=(null) inode=15983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=30 name=(null) inode=15969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=31 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=32 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=33 name=(null) inode=15985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=34 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=35 name=(null) inode=15986 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=36 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=37 name=(null) inode=15987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=38 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=39 name=(null) inode=15988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=40 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=41 name=(null) inode=15989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=42 name=(null) inode=15969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=43 name=(null) inode=15990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=44 name=(null) inode=15990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=45 name=(null) inode=15991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=46 name=(null) inode=15990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=47 name=(null) inode=15992 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=48 name=(null) inode=15990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=49 name=(null) inode=15993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=50 name=(null) inode=15990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=51 name=(null) inode=15994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=52 name=(null) inode=15990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=53 name=(null) inode=15995 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=55 name=(null) inode=15996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=56 name=(null) inode=15996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=57 name=(null) inode=15997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=58 name=(null) inode=15996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=59 name=(null) inode=15998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=60 name=(null) inode=15996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=61 name=(null) inode=15999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=62 name=(null) inode=15999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=63 name=(null) inode=16000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=64 name=(null) inode=15999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=65 name=(null) inode=16001 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=66 name=(null) inode=15999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=67 name=(null) inode=16002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=68 name=(null) inode=15999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=69 name=(null) inode=16003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=70 name=(null) inode=15999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=71 name=(null) inode=16004 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=72 name=(null) inode=15996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=73 name=(null) inode=16005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=74 name=(null) inode=16005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=75 name=(null) inode=16006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=76 name=(null) inode=16005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=77 name=(null) inode=16007 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=78 name=(null) inode=16005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=79 name=(null) inode=16008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=80 name=(null) inode=16005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=81 name=(null) inode=16009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=82 name=(null) inode=16005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=83 name=(null) inode=16010 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=84 name=(null) inode=15996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=85 name=(null) inode=16011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=86 name=(null) inode=16011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=87 name=(null) inode=16012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=88 name=(null) inode=16011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=89 name=(null) inode=16013 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=90 name=(null) inode=16011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=91 name=(null) inode=16014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=92 name=(null) inode=16011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=93 name=(null) inode=16015 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=94 name=(null) inode=16011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=95 name=(null) inode=16016 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=96 name=(null) inode=15996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=97 name=(null) inode=16017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=98 name=(null) inode=16017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=99 name=(null) inode=16018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=100 name=(null) inode=16017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=101 name=(null) inode=16019 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=102 name=(null) inode=16017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=103 name=(null) inode=16020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=104 name=(null) inode=16017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=105 name=(null) inode=16021 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=106 name=(null) inode=16017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=107 name=(null) inode=16022 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PATH item=109 name=(null) inode=16023 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:30:23.995000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 00:30:24.039437 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Sep 6 00:30:24.042418 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Sep 6 00:30:24.062752 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Sep 6 00:30:24.063067 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Sep 6 00:30:24.248411 systemd[1]: Finished systemd-udev-settle.service. Sep 6 00:30:24.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.252014 systemd[1]: Starting lvm2-activation-early.service... Sep 6 00:30:24.277172 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:30:24.310427 systemd[1]: Finished lvm2-activation-early.service. Sep 6 00:30:24.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.311401 systemd[1]: Reached target cryptsetup.target. Sep 6 00:30:24.314099 systemd[1]: Starting lvm2-activation.service... Sep 6 00:30:24.320499 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:30:24.349455 systemd[1]: Finished lvm2-activation.service. Sep 6 00:30:24.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.352586 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:30:24.353320 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 00:30:24.353466 systemd[1]: Reached target local-fs.target. Sep 6 00:30:24.354129 systemd[1]: Reached target machines.target. Sep 6 00:30:24.357692 systemd[1]: Starting ldconfig.service... Sep 6 00:30:24.359277 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:30:24.359352 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:30:24.363680 systemd[1]: Starting systemd-boot-update.service... Sep 6 00:30:24.367315 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 00:30:24.377453 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 00:30:24.381141 systemd[1]: Starting systemd-sysext.service... Sep 6 00:30:24.384055 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Sep 6 00:30:24.388993 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 00:30:24.415483 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 00:30:24.444397 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 00:30:24.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.444717 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 00:30:24.447072 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 00:30:24.448020 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 00:30:24.451859 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 00:30:24.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.467951 kernel: loop0: detected capacity change from 0 to 229808 Sep 6 00:30:24.502756 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 00:30:24.528425 kernel: loop1: detected capacity change from 0 to 229808 Sep 6 00:30:24.550139 systemd-fsck[1057]: fsck.fat 4.2 (2021-01-31) Sep 6 00:30:24.550139 systemd-fsck[1057]: /dev/vda1: 790 files, 120761/258078 clusters Sep 6 00:30:24.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.553195 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 00:30:24.557172 (sd-sysext)[1060]: Using extensions 'kubernetes'. Sep 6 00:30:24.557631 systemd[1]: Mounting boot.mount... Sep 6 00:30:24.559978 (sd-sysext)[1060]: Merged extensions into '/usr'. Sep 6 00:30:24.599258 systemd[1]: Mounted boot.mount. Sep 6 00:30:24.600398 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:30:24.603206 systemd[1]: Mounting usr-share-oem.mount... Sep 6 00:30:24.607731 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:30:24.609766 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:30:24.613461 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:30:24.616841 systemd[1]: Starting modprobe@loop.service... Sep 6 00:30:24.618706 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:30:24.618953 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:30:24.619123 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:30:24.620878 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:30:24.622023 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:30:24.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.624576 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:30:24.625361 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:30:24.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.630971 systemd[1]: Mounted usr-share-oem.mount. Sep 6 00:30:24.632098 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:30:24.632315 systemd[1]: Finished modprobe@loop.service. Sep 6 00:30:24.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.633761 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:30:24.633923 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:30:24.635227 systemd[1]: Finished systemd-sysext.service. Sep 6 00:30:24.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.640462 systemd[1]: Starting ensure-sysext.service... Sep 6 00:30:24.642750 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 00:30:24.645676 systemd[1]: Finished systemd-boot-update.service. Sep 6 00:30:24.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:24.653923 systemd[1]: Reloading. Sep 6 00:30:24.680937 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 00:30:24.687443 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 00:30:24.699102 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 00:30:24.836115 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-09-06T00:30:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:30:24.837642 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-09-06T00:30:24Z" level=info msg="torcx already run" Sep 6 00:30:24.867003 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 00:30:24.957708 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:30:24.957747 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:30:24.986249 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:30:25.068000 audit: BPF prog-id=27 op=LOAD Sep 6 00:30:25.068000 audit: BPF prog-id=24 op=UNLOAD Sep 6 00:30:25.068000 audit: BPF prog-id=28 op=LOAD Sep 6 00:30:25.068000 audit: BPF prog-id=29 op=LOAD Sep 6 00:30:25.068000 audit: BPF prog-id=25 op=UNLOAD Sep 6 00:30:25.068000 audit: BPF prog-id=26 op=UNLOAD Sep 6 00:30:25.073000 audit: BPF prog-id=30 op=LOAD Sep 6 00:30:25.073000 audit: BPF prog-id=31 op=LOAD Sep 6 00:30:25.073000 audit: BPF prog-id=21 op=UNLOAD Sep 6 00:30:25.073000 audit: BPF prog-id=22 op=UNLOAD Sep 6 00:30:25.074000 audit: BPF prog-id=32 op=LOAD Sep 6 00:30:25.074000 audit: BPF prog-id=23 op=UNLOAD Sep 6 00:30:25.075000 audit: BPF prog-id=33 op=LOAD Sep 6 00:30:25.075000 audit: BPF prog-id=18 op=UNLOAD Sep 6 00:30:25.075000 audit: BPF prog-id=34 op=LOAD Sep 6 00:30:25.076000 audit: BPF prog-id=35 op=LOAD Sep 6 00:30:25.076000 audit: BPF prog-id=19 op=UNLOAD Sep 6 00:30:25.076000 audit: BPF prog-id=20 op=UNLOAD Sep 6 00:30:25.080224 systemd[1]: Finished ldconfig.service. Sep 6 00:30:25.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.082974 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 00:30:25.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.089298 systemd[1]: Starting audit-rules.service... Sep 6 00:30:25.091956 systemd[1]: Starting clean-ca-certificates.service... Sep 6 00:30:25.095605 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 00:30:25.100000 audit: BPF prog-id=36 op=LOAD Sep 6 00:30:25.102492 systemd[1]: Starting systemd-resolved.service... Sep 6 00:30:25.104000 audit: BPF prog-id=37 op=LOAD Sep 6 00:30:25.107755 systemd[1]: Starting systemd-timesyncd.service... Sep 6 00:30:25.111044 systemd[1]: Starting systemd-update-utmp.service... Sep 6 00:30:25.113226 systemd[1]: Finished clean-ca-certificates.service. Sep 6 00:30:25.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.117315 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:30:25.124111 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.127252 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:30:25.132090 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:30:25.135583 systemd[1]: Starting modprobe@loop.service... Sep 6 00:30:25.136963 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.137230 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:30:25.137526 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:30:25.141415 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:30:25.141691 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:30:25.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.143127 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:30:25.143336 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:30:25.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.147293 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:30:25.147540 systemd[1]: Finished modprobe@loop.service. Sep 6 00:30:25.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.148000 audit[1143]: SYSTEM_BOOT pid=1143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.157122 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.160004 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:30:25.164639 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:30:25.168200 systemd[1]: Starting modprobe@loop.service... Sep 6 00:30:25.171528 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.171713 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:30:25.171880 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:30:25.173718 systemd[1]: Finished systemd-update-utmp.service. Sep 6 00:30:25.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.175119 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:30:25.175323 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:30:25.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.176688 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:30:25.176887 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:30:25.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.178443 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:30:25.178666 systemd[1]: Finished modprobe@loop.service. Sep 6 00:30:25.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.188655 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.191535 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:30:25.195242 systemd[1]: Starting modprobe@drm.service... Sep 6 00:30:25.199563 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:30:25.202532 systemd[1]: Starting modprobe@loop.service... Sep 6 00:30:25.203725 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.203974 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:30:25.208080 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:30:25.209021 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:30:25.211649 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:30:25.211945 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:30:25.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.215559 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:30:25.215773 systemd[1]: Finished modprobe@drm.service. Sep 6 00:30:25.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.217189 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:30:25.217410 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:30:25.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.220928 systemd[1]: Finished ensure-sysext.service. Sep 6 00:30:25.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.223078 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:30:25.230367 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:30:25.230638 systemd[1]: Finished modprobe@loop.service. Sep 6 00:30:25.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.231653 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.260921 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 00:30:25.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:25.264206 systemd[1]: Starting systemd-update-done.service... Sep 6 00:30:25.266000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 00:30:25.266000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeffc52990 a2=420 a3=0 items=0 ppid=1135 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:25.266000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 00:30:25.267829 augenrules[1166]: No rules Sep 6 00:30:25.268866 systemd[1]: Finished audit-rules.service. Sep 6 00:30:25.289150 systemd[1]: Finished systemd-update-done.service. Sep 6 00:30:25.306069 systemd-resolved[1139]: Positive Trust Anchors: Sep 6 00:30:25.306102 systemd-resolved[1139]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:30:25.306145 systemd-resolved[1139]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:30:25.310356 systemd[1]: Started systemd-timesyncd.service. Sep 6 00:30:25.311373 systemd[1]: Reached target time-set.target. Sep 6 00:30:25.316811 systemd-resolved[1139]: Using system hostname 'srv-iwke2.gb1.brightbox.com'. Sep 6 00:30:25.319943 systemd[1]: Started systemd-resolved.service. Sep 6 00:30:25.320724 systemd[1]: Reached target network.target. Sep 6 00:30:25.321337 systemd[1]: Reached target nss-lookup.target. Sep 6 00:30:25.322015 systemd[1]: Reached target sysinit.target. Sep 6 00:30:25.322807 systemd[1]: Started motdgen.path. Sep 6 00:30:25.323445 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 00:30:25.324478 systemd[1]: Started logrotate.timer. Sep 6 00:30:25.325198 systemd[1]: Started mdadm.timer. Sep 6 00:30:25.325914 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 00:30:25.326676 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 00:30:25.326730 systemd[1]: Reached target paths.target. Sep 6 00:30:25.327324 systemd[1]: Reached target timers.target. Sep 6 00:30:25.328515 systemd[1]: Listening on dbus.socket. Sep 6 00:30:25.331299 systemd[1]: Starting docker.socket... Sep 6 00:30:25.336069 systemd[1]: Listening on sshd.socket. Sep 6 00:30:25.336891 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:30:25.337578 systemd[1]: Listening on docker.socket. Sep 6 00:30:25.338319 systemd[1]: Reached target sockets.target. Sep 6 00:30:25.338975 systemd[1]: Reached target basic.target. Sep 6 00:30:25.339673 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.339736 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:30:25.341818 systemd[1]: Starting containerd.service... Sep 6 00:30:25.345106 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 6 00:30:25.348309 systemd[1]: Starting dbus.service... Sep 6 00:30:25.352359 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 00:30:25.357188 systemd[1]: Starting extend-filesystems.service... Sep 6 00:30:25.378065 jq[1180]: false Sep 6 00:30:25.359259 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 00:30:25.367317 systemd[1]: Starting motdgen.service... Sep 6 00:30:25.371593 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 00:30:25.381703 systemd[1]: Starting sshd-keygen.service... Sep 6 00:30:25.388237 systemd[1]: Starting systemd-logind.service... Sep 6 00:30:25.389371 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:30:25.389586 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 00:30:25.390463 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 00:30:25.393298 systemd[1]: Starting update-engine.service... Sep 6 00:30:25.396992 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 00:30:25.403584 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 00:30:25.403921 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 00:30:25.424563 jq[1194]: true Sep 6 00:30:25.440087 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 00:30:25.440440 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 00:30:25.445590 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:30:25.445639 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:30:25.453997 extend-filesystems[1181]: Found loop1 Sep 6 00:30:25.458488 jq[1201]: true Sep 6 00:30:25.470054 dbus-daemon[1177]: [system] SELinux support is enabled Sep 6 00:30:25.472259 systemd[1]: Started dbus.service. Sep 6 00:30:25.472909 extend-filesystems[1181]: Found vda Sep 6 00:30:25.475913 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 00:30:25.475978 systemd[1]: Reached target system-config.target. Sep 6 00:30:25.476221 extend-filesystems[1181]: Found vda1 Sep 6 00:30:25.478221 extend-filesystems[1181]: Found vda2 Sep 6 00:30:25.478221 extend-filesystems[1181]: Found vda3 Sep 6 00:30:25.478221 extend-filesystems[1181]: Found usr Sep 6 00:30:25.478221 extend-filesystems[1181]: Found vda4 Sep 6 00:30:25.478221 extend-filesystems[1181]: Found vda6 Sep 6 00:30:25.478221 extend-filesystems[1181]: Found vda7 Sep 6 00:30:25.478221 extend-filesystems[1181]: Found vda9 Sep 6 00:30:25.476736 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 00:30:25.493170 dbus-daemon[1177]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1029 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 6 00:30:25.498581 extend-filesystems[1181]: Checking size of /dev/vda9 Sep 6 00:30:25.476762 systemd[1]: Reached target user-config.target. Sep 6 00:30:25.494941 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 6 00:30:25.602511 update_engine[1192]: I0906 00:30:25.580487 1192 main.cc:92] Flatcar Update Engine starting Sep 6 00:30:25.602511 update_engine[1192]: I0906 00:30:25.587827 1192 update_check_scheduler.cc:74] Next update check in 5m53s Sep 6 00:30:25.603262 extend-filesystems[1181]: Resized partition /dev/vda9 Sep 6 00:30:25.610776 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Sep 6 00:30:25.610906 bash[1226]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:30:25.489821 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 00:30:25.616426 extend-filesystems[1228]: resize2fs 1.46.5 (30-Dec-2021) Sep 6 00:30:25.490120 systemd[1]: Finished motdgen.service. Sep 6 00:30:25.511211 systemd[1]: Starting systemd-hostnamed.service... Sep 6 00:30:25.544744 systemd-timesyncd[1140]: Contacted time server 85.199.214.99:123 (0.flatcar.pool.ntp.org). Sep 6 00:30:25.544842 systemd-timesyncd[1140]: Initial clock synchronization to Sat 2025-09-06 00:30:25.281701 UTC. Sep 6 00:30:25.589273 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 00:30:25.592050 systemd[1]: Started update-engine.service. Sep 6 00:30:25.597590 systemd[1]: Started locksmithd.service. Sep 6 00:30:25.644893 systemd-networkd[1029]: eth0: Gained IPv6LL Sep 6 00:30:25.650273 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:30:25.651350 systemd[1]: Reached target network-online.target. Sep 6 00:30:25.664837 systemd[1]: Starting kubelet.service... Sep 6 00:30:25.684338 env[1196]: time="2025-09-06T00:30:25.684219169Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 00:30:25.690666 systemd-logind[1190]: Watching system buttons on /dev/input/event2 (Power Button) Sep 6 00:30:25.695401 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 00:30:25.696475 systemd-logind[1190]: New seat seat0. Sep 6 00:30:25.702884 systemd[1]: Started systemd-logind.service. Sep 6 00:30:25.732406 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 6 00:30:25.732674 systemd[1]: Started systemd-hostnamed.service. Sep 6 00:30:25.734727 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1215 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 6 00:30:25.739539 systemd[1]: Starting polkit.service... Sep 6 00:30:25.801987 polkitd[1236]: Started polkitd version 121 Sep 6 00:30:25.852416 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Sep 6 00:30:25.870512 env[1196]: time="2025-09-06T00:30:25.864159412Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 00:30:25.858698 polkitd[1236]: Loading rules from directory /etc/polkit-1/rules.d Sep 6 00:30:25.866467 polkitd[1236]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 6 00:30:25.871578 env[1196]: time="2025-09-06T00:30:25.871528964Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:30:25.874794 env[1196]: time="2025-09-06T00:30:25.874741170Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:30:25.875106 extend-filesystems[1228]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 6 00:30:25.875106 extend-filesystems[1228]: old_desc_blocks = 1, new_desc_blocks = 8 Sep 6 00:30:25.875106 extend-filesystems[1228]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Sep 6 00:30:25.882041 extend-filesystems[1181]: Resized filesystem in /dev/vda9 Sep 6 00:30:25.876619 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 00:30:25.875745 polkitd[1236]: Finished loading, compiling and executing 2 rules Sep 6 00:30:25.876988 systemd[1]: Finished extend-filesystems.service. Sep 6 00:30:25.877414 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 6 00:30:25.878784 systemd[1]: Started polkit.service. Sep 6 00:30:25.877998 polkitd[1236]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 6 00:30:25.884428 env[1196]: time="2025-09-06T00:30:25.883762614Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:30:25.884428 env[1196]: time="2025-09-06T00:30:25.884256652Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:30:25.884428 env[1196]: time="2025-09-06T00:30:25.884292608Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 00:30:25.884428 env[1196]: time="2025-09-06T00:30:25.884325081Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 00:30:25.884428 env[1196]: time="2025-09-06T00:30:25.884346011Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 00:30:25.884976 env[1196]: time="2025-09-06T00:30:25.884944910Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:30:25.886159 env[1196]: time="2025-09-06T00:30:25.886109544Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:30:25.886624 env[1196]: time="2025-09-06T00:30:25.886577057Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:30:25.886772 env[1196]: time="2025-09-06T00:30:25.886741610Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 00:30:25.886999 env[1196]: time="2025-09-06T00:30:25.886969128Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 00:30:25.887144 env[1196]: time="2025-09-06T00:30:25.887115603Z" level=info msg="metadata content store policy set" policy=shared Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895237626Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895325323Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895360001Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895498106Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895542601Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895569647Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895595745Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895634164Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895664316Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895695425Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895726436Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895758599Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.895990756Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 00:30:25.898423 env[1196]: time="2025-09-06T00:30:25.896170435Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.896668103Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.896734183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.896770412Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.896896482Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.896924682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.896956282Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.896987678Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897014077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897044543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897092566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897116626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897142515Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897364294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897426155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899262 env[1196]: time="2025-09-06T00:30:25.897451955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.899999 env[1196]: time="2025-09-06T00:30:25.897472772Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 00:30:25.899999 env[1196]: time="2025-09-06T00:30:25.897511959Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 00:30:25.899999 env[1196]: time="2025-09-06T00:30:25.897538536Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 00:30:25.899999 env[1196]: time="2025-09-06T00:30:25.897600015Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 00:30:25.899999 env[1196]: time="2025-09-06T00:30:25.897688415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 00:30:25.900241 env[1196]: time="2025-09-06T00:30:25.898023692Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 00:30:25.900241 env[1196]: time="2025-09-06T00:30:25.898134478Z" level=info msg="Connect containerd service" Sep 6 00:30:25.900241 env[1196]: time="2025-09-06T00:30:25.898227320Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 00:30:25.904231 env[1196]: time="2025-09-06T00:30:25.901805688Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:30:25.904231 env[1196]: time="2025-09-06T00:30:25.902423389Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 00:30:25.904231 env[1196]: time="2025-09-06T00:30:25.902530279Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 00:30:25.902771 systemd[1]: Started containerd.service. Sep 6 00:30:25.904673 env[1196]: time="2025-09-06T00:30:25.904640733Z" level=info msg="containerd successfully booted in 0.223414s" Sep 6 00:30:25.905496 env[1196]: time="2025-09-06T00:30:25.905375323Z" level=info msg="Start subscribing containerd event" Sep 6 00:30:25.905574 env[1196]: time="2025-09-06T00:30:25.905550114Z" level=info msg="Start recovering state" Sep 6 00:30:25.905773 env[1196]: time="2025-09-06T00:30:25.905739563Z" level=info msg="Start event monitor" Sep 6 00:30:25.905843 env[1196]: time="2025-09-06T00:30:25.905797331Z" level=info msg="Start snapshots syncer" Sep 6 00:30:25.905843 env[1196]: time="2025-09-06T00:30:25.905833552Z" level=info msg="Start cni network conf syncer for default" Sep 6 00:30:25.905944 env[1196]: time="2025-09-06T00:30:25.905856362Z" level=info msg="Start streaming server" Sep 6 00:30:25.925591 systemd-hostnamed[1215]: Hostname set to (static) Sep 6 00:30:26.090358 locksmithd[1229]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 00:30:26.976564 systemd[1]: Started kubelet.service. Sep 6 00:30:27.155771 systemd-networkd[1029]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:690:24:19ff:fef4:1a42/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:690:24:19ff:fef4:1a42/64 assigned by NDisc. Sep 6 00:30:27.155789 systemd-networkd[1029]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 00:30:27.317138 systemd[1]: Created slice system-sshd.slice. Sep 6 00:30:27.478399 sshd_keygen[1203]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 00:30:27.514772 systemd[1]: Finished sshd-keygen.service. Sep 6 00:30:27.519596 systemd[1]: Starting issuegen.service... Sep 6 00:30:27.523274 systemd[1]: Started sshd@0-10.244.26.66:22-139.178.89.65:41350.service. Sep 6 00:30:27.534950 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 00:30:27.535226 systemd[1]: Finished issuegen.service. Sep 6 00:30:27.538677 systemd[1]: Starting systemd-user-sessions.service... Sep 6 00:30:27.558254 systemd[1]: Finished systemd-user-sessions.service. Sep 6 00:30:27.562554 systemd[1]: Started getty@tty1.service. Sep 6 00:30:27.568191 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 00:30:27.571039 systemd[1]: Reached target getty.target. Sep 6 00:30:27.740654 kubelet[1252]: E0906 00:30:27.740504 1252 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:30:27.742963 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:30:27.743204 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:30:27.743793 systemd[1]: kubelet.service: Consumed 1.220s CPU time. Sep 6 00:30:28.428808 sshd[1268]: Accepted publickey for core from 139.178.89.65 port 41350 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:28.431968 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:28.449877 systemd[1]: Created slice user-500.slice. Sep 6 00:30:28.453237 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 00:30:28.461710 systemd-logind[1190]: New session 1 of user core. Sep 6 00:30:28.469736 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 00:30:28.477130 systemd[1]: Starting user@500.service... Sep 6 00:30:28.488893 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:28.603662 systemd[1277]: Queued start job for default target default.target. Sep 6 00:30:28.604729 systemd[1277]: Reached target paths.target. Sep 6 00:30:28.604767 systemd[1277]: Reached target sockets.target. Sep 6 00:30:28.604788 systemd[1277]: Reached target timers.target. Sep 6 00:30:28.604808 systemd[1277]: Reached target basic.target. Sep 6 00:30:28.604976 systemd[1]: Started user@500.service. Sep 6 00:30:28.607500 systemd[1277]: Reached target default.target. Sep 6 00:30:28.607591 systemd[1277]: Startup finished in 107ms. Sep 6 00:30:28.608730 systemd[1]: Started session-1.scope. Sep 6 00:30:29.226224 systemd[1]: Started sshd@1-10.244.26.66:22-139.178.89.65:41366.service. Sep 6 00:30:30.107105 sshd[1286]: Accepted publickey for core from 139.178.89.65 port 41366 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:30.109964 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:30.117744 systemd[1]: Started session-2.scope. Sep 6 00:30:30.121635 systemd-logind[1190]: New session 2 of user core. Sep 6 00:30:30.723713 sshd[1286]: pam_unix(sshd:session): session closed for user core Sep 6 00:30:30.729116 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. Sep 6 00:30:30.729926 systemd[1]: sshd@1-10.244.26.66:22-139.178.89.65:41366.service: Deactivated successfully. Sep 6 00:30:30.731296 systemd[1]: session-2.scope: Deactivated successfully. Sep 6 00:30:30.732602 systemd-logind[1190]: Removed session 2. Sep 6 00:30:30.879633 systemd[1]: Started sshd@2-10.244.26.66:22-139.178.89.65:45934.service. Sep 6 00:30:31.836768 sshd[1292]: Accepted publickey for core from 139.178.89.65 port 45934 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:31.839029 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:31.848502 systemd-logind[1190]: New session 3 of user core. Sep 6 00:30:31.848776 systemd[1]: Started session-3.scope. Sep 6 00:30:32.498090 coreos-metadata[1176]: Sep 06 00:30:32.497 WARN failed to locate config-drive, using the metadata service API instead Sep 6 00:30:32.545160 sshd[1292]: pam_unix(sshd:session): session closed for user core Sep 6 00:30:32.549919 systemd[1]: sshd@2-10.244.26.66:22-139.178.89.65:45934.service: Deactivated successfully. Sep 6 00:30:32.550850 systemd[1]: session-3.scope: Deactivated successfully. Sep 6 00:30:32.552831 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. Sep 6 00:30:32.554005 systemd-logind[1190]: Removed session 3. Sep 6 00:30:32.557709 coreos-metadata[1176]: Sep 06 00:30:32.557 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Sep 6 00:30:32.584013 coreos-metadata[1176]: Sep 06 00:30:32.583 INFO Fetch successful Sep 6 00:30:32.584686 coreos-metadata[1176]: Sep 06 00:30:32.584 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 6 00:30:32.630063 coreos-metadata[1176]: Sep 06 00:30:32.629 INFO Fetch successful Sep 6 00:30:32.636728 unknown[1176]: wrote ssh authorized keys file for user: core Sep 6 00:30:32.651803 update-ssh-keys[1299]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:30:32.652616 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 6 00:30:32.653276 systemd[1]: Reached target multi-user.target. Sep 6 00:30:32.657371 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 00:30:32.671305 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 00:30:32.671612 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 00:30:32.672292 systemd[1]: Startup finished in 1.212s (kernel) + 6.002s (initrd) + 13.939s (userspace) = 21.153s. Sep 6 00:30:37.994716 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 00:30:37.995033 systemd[1]: Stopped kubelet.service. Sep 6 00:30:37.995120 systemd[1]: kubelet.service: Consumed 1.220s CPU time. Sep 6 00:30:37.997957 systemd[1]: Starting kubelet.service... Sep 6 00:30:38.176120 systemd[1]: Started kubelet.service. Sep 6 00:30:38.294151 kubelet[1305]: E0906 00:30:38.293879 1305 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:30:38.298610 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:30:38.298850 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:30:42.613179 systemd[1]: Started sshd@3-10.244.26.66:22-139.178.89.65:36500.service. Sep 6 00:30:43.511043 sshd[1311]: Accepted publickey for core from 139.178.89.65 port 36500 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:43.513408 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:43.521782 systemd-logind[1190]: New session 4 of user core. Sep 6 00:30:43.522654 systemd[1]: Started session-4.scope. Sep 6 00:30:44.136992 sshd[1311]: pam_unix(sshd:session): session closed for user core Sep 6 00:30:44.141213 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. Sep 6 00:30:44.141639 systemd[1]: sshd@3-10.244.26.66:22-139.178.89.65:36500.service: Deactivated successfully. Sep 6 00:30:44.142614 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 00:30:44.143971 systemd-logind[1190]: Removed session 4. Sep 6 00:30:44.284888 systemd[1]: Started sshd@4-10.244.26.66:22-139.178.89.65:36514.service. Sep 6 00:30:45.180635 sshd[1317]: Accepted publickey for core from 139.178.89.65 port 36514 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:45.183526 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:45.192701 systemd[1]: Started session-5.scope. Sep 6 00:30:45.193848 systemd-logind[1190]: New session 5 of user core. Sep 6 00:30:45.797105 sshd[1317]: pam_unix(sshd:session): session closed for user core Sep 6 00:30:45.801030 systemd[1]: sshd@4-10.244.26.66:22-139.178.89.65:36514.service: Deactivated successfully. Sep 6 00:30:45.802021 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 00:30:45.802908 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. Sep 6 00:30:45.804410 systemd-logind[1190]: Removed session 5. Sep 6 00:30:45.969999 systemd[1]: Started sshd@5-10.244.26.66:22-139.178.89.65:36524.service. Sep 6 00:30:46.926873 sshd[1323]: Accepted publickey for core from 139.178.89.65 port 36524 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:46.929647 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:46.938966 systemd-logind[1190]: New session 6 of user core. Sep 6 00:30:46.939981 systemd[1]: Started session-6.scope. Sep 6 00:30:47.592304 sshd[1323]: pam_unix(sshd:session): session closed for user core Sep 6 00:30:47.596834 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. Sep 6 00:30:47.598226 systemd[1]: sshd@5-10.244.26.66:22-139.178.89.65:36524.service: Deactivated successfully. Sep 6 00:30:47.599217 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 00:30:47.600438 systemd-logind[1190]: Removed session 6. Sep 6 00:30:47.749729 systemd[1]: Started sshd@6-10.244.26.66:22-139.178.89.65:36530.service. Sep 6 00:30:48.542324 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 00:30:48.542760 systemd[1]: Stopped kubelet.service. Sep 6 00:30:48.545040 systemd[1]: Starting kubelet.service... Sep 6 00:30:48.706323 sshd[1329]: Accepted publickey for core from 139.178.89.65 port 36530 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:48.708193 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:48.721619 systemd-logind[1190]: New session 7 of user core. Sep 6 00:30:48.722447 systemd[1]: Started session-7.scope. Sep 6 00:30:48.725438 systemd[1]: Started kubelet.service. Sep 6 00:30:48.835001 kubelet[1335]: E0906 00:30:48.834238 1335 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:30:48.837716 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:30:48.837957 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:30:49.229980 sudo[1342]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 00:30:49.231205 sudo[1342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:30:49.240796 dbus-daemon[1177]: \xd0\u000d\xe8\xc08V: received setenforce notice (enforcing=-1814994416) Sep 6 00:30:49.244271 sudo[1342]: pam_unix(sudo:session): session closed for user root Sep 6 00:30:49.399674 sshd[1329]: pam_unix(sshd:session): session closed for user core Sep 6 00:30:49.408347 systemd[1]: sshd@6-10.244.26.66:22-139.178.89.65:36530.service: Deactivated successfully. Sep 6 00:30:49.409640 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 00:30:49.411165 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. Sep 6 00:30:49.413294 systemd-logind[1190]: Removed session 7. Sep 6 00:30:49.561875 systemd[1]: Started sshd@7-10.244.26.66:22-139.178.89.65:36536.service. Sep 6 00:30:50.521245 sshd[1346]: Accepted publickey for core from 139.178.89.65 port 36536 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:50.524031 sshd[1346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:50.532290 systemd-logind[1190]: New session 8 of user core. Sep 6 00:30:50.532433 systemd[1]: Started session-8.scope. Sep 6 00:30:51.030315 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 00:30:51.031535 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:30:51.036851 sudo[1350]: pam_unix(sudo:session): session closed for user root Sep 6 00:30:51.045123 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 00:30:51.045567 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:30:51.060581 systemd[1]: Stopping audit-rules.service... Sep 6 00:30:51.061000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:30:51.062843 auditctl[1353]: No rules Sep 6 00:30:51.063927 kernel: kauditd_printk_skb: 180 callbacks suppressed Sep 6 00:30:51.064039 kernel: audit: type=1305 audit(1757118651.061:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:30:51.064528 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 00:30:51.064837 systemd[1]: Stopped audit-rules.service. Sep 6 00:30:51.071041 kernel: audit: type=1300 audit(1757118651.061:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1e9bfe90 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:51.061000 audit[1353]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1e9bfe90 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:51.070751 systemd[1]: Starting audit-rules.service... Sep 6 00:30:51.061000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:30:51.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.082969 kernel: audit: type=1327 audit(1757118651.061:217): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:30:51.083157 kernel: audit: type=1131 audit(1757118651.063:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.102570 augenrules[1370]: No rules Sep 6 00:30:51.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.103961 systemd[1]: Finished audit-rules.service. Sep 6 00:30:51.112465 kernel: audit: type=1130 audit(1757118651.103:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.112448 sudo[1349]: pam_unix(sudo:session): session closed for user root Sep 6 00:30:51.112000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.112000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.125766 kernel: audit: type=1106 audit(1757118651.112:220): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.125871 kernel: audit: type=1104 audit(1757118651.112:221): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.267672 sshd[1346]: pam_unix(sshd:session): session closed for user core Sep 6 00:30:51.269000 audit[1346]: USER_END pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:51.272874 systemd[1]: sshd@7-10.244.26.66:22-139.178.89.65:36536.service: Deactivated successfully. Sep 6 00:30:51.275119 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 00:30:51.269000 audit[1346]: CRED_DISP pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:51.279445 kernel: audit: type=1106 audit(1757118651.269:222): pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:51.279527 kernel: audit: type=1104 audit(1757118651.269:223): pid=1346 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:51.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.26.66:22-139.178.89.65:36536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.293263 systemd-logind[1190]: Session 8 logged out. Waiting for processes to exit. Sep 6 00:30:51.293550 kernel: audit: type=1131 audit(1757118651.273:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.26.66:22-139.178.89.65:36536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:51.295227 systemd-logind[1190]: Removed session 8. Sep 6 00:30:51.407076 systemd[1]: Started sshd@8-10.244.26.66:22-139.178.89.65:51240.service. Sep 6 00:30:51.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.26.66:22-139.178.89.65:51240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:52.305000 audit[1376]: USER_ACCT pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:52.307415 sshd[1376]: Accepted publickey for core from 139.178.89.65 port 51240 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:30:52.307000 audit[1376]: CRED_ACQ pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:52.307000 audit[1376]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd14231cf0 a2=3 a3=0 items=0 ppid=1 pid=1376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:52.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:30:52.309582 sshd[1376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:30:52.317839 systemd-logind[1190]: New session 9 of user core. Sep 6 00:30:52.319473 systemd[1]: Started session-9.scope. Sep 6 00:30:52.327000 audit[1376]: USER_START pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:52.329000 audit[1378]: CRED_ACQ pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:30:52.785000 audit[1379]: USER_ACCT pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:30:52.787508 sudo[1379]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 00:30:52.786000 audit[1379]: CRED_REFR pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:30:52.788573 sudo[1379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:30:52.790000 audit[1379]: USER_START pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:30:52.813027 systemd[1]: Starting coreos-metadata.service... Sep 6 00:30:57.201894 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 6 00:30:57.210308 kernel: kauditd_printk_skb: 11 callbacks suppressed Sep 6 00:30:57.210574 kernel: audit: type=1131 audit(1757118657.202:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:57.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:57.221000 audit: BPF prog-id=43 op=UNLOAD Sep 6 00:30:57.221000 audit: BPF prog-id=42 op=UNLOAD Sep 6 00:30:57.226421 kernel: audit: type=1334 audit(1757118657.221:235): prog-id=43 op=UNLOAD Sep 6 00:30:57.226535 kernel: audit: type=1334 audit(1757118657.221:236): prog-id=42 op=UNLOAD Sep 6 00:30:57.226594 kernel: audit: type=1334 audit(1757118657.221:237): prog-id=41 op=UNLOAD Sep 6 00:30:57.221000 audit: BPF prog-id=41 op=UNLOAD Sep 6 00:30:58.948630 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 00:30:58.949148 systemd[1]: Stopped kubelet.service. Sep 6 00:30:58.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:58.956492 kernel: audit: type=1130 audit(1757118658.947:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:58.952347 systemd[1]: Starting kubelet.service... Sep 6 00:30:58.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:58.963411 kernel: audit: type=1131 audit(1757118658.947:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:59.110631 systemd[1]: Started kubelet.service. Sep 6 00:30:59.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:59.120498 kernel: audit: type=1130 audit(1757118659.109:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:30:59.196258 kubelet[1394]: E0906 00:30:59.196137 1394 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:30:59.198528 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:30:59.198852 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:30:59.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:30:59.206471 kernel: audit: type=1131 audit(1757118659.198:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:30:59.870901 coreos-metadata[1383]: Sep 06 00:30:59.870 WARN failed to locate config-drive, using the metadata service API instead Sep 6 00:30:59.925291 coreos-metadata[1383]: Sep 06 00:30:59.925 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Sep 6 00:30:59.927508 coreos-metadata[1383]: Sep 06 00:30:59.927 INFO Fetch successful Sep 6 00:30:59.927807 coreos-metadata[1383]: Sep 06 00:30:59.927 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Sep 6 00:30:59.940594 coreos-metadata[1383]: Sep 06 00:30:59.940 INFO Fetch successful Sep 6 00:30:59.940955 coreos-metadata[1383]: Sep 06 00:30:59.940 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Sep 6 00:30:59.960965 coreos-metadata[1383]: Sep 06 00:30:59.960 INFO Fetch successful Sep 6 00:30:59.961353 coreos-metadata[1383]: Sep 06 00:30:59.961 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Sep 6 00:30:59.979084 coreos-metadata[1383]: Sep 06 00:30:59.978 INFO Fetch successful Sep 6 00:30:59.979499 coreos-metadata[1383]: Sep 06 00:30:59.979 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Sep 6 00:30:59.996403 coreos-metadata[1383]: Sep 06 00:30:59.996 INFO Fetch successful Sep 6 00:31:00.019194 kernel: audit: type=1130 audit(1757118660.008:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:00.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:00.010022 systemd[1]: Finished coreos-metadata.service. Sep 6 00:31:00.847196 systemd[1]: Stopped kubelet.service. Sep 6 00:31:00.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:00.858742 systemd[1]: Starting kubelet.service... Sep 6 00:31:00.861605 kernel: audit: type=1130 audit(1757118660.848:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:00.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:00.901119 systemd[1]: Reloading. Sep 6 00:31:01.060137 /usr/lib/systemd/system-generators/torcx-generator[1456]: time="2025-09-06T00:31:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:31:01.061499 /usr/lib/systemd/system-generators/torcx-generator[1456]: time="2025-09-06T00:31:01Z" level=info msg="torcx already run" Sep 6 00:31:01.188174 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:31:01.188221 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:31:01.217888 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.316000 audit: BPF prog-id=46 op=LOAD Sep 6 00:31:01.316000 audit: BPF prog-id=36 op=UNLOAD Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.321000 audit: BPF prog-id=47 op=LOAD Sep 6 00:31:01.322000 audit: BPF prog-id=38 op=UNLOAD Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit: BPF prog-id=48 op=LOAD Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.322000 audit: BPF prog-id=49 op=LOAD Sep 6 00:31:01.322000 audit: BPF prog-id=39 op=UNLOAD Sep 6 00:31:01.322000 audit: BPF prog-id=40 op=UNLOAD Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.326000 audit: BPF prog-id=50 op=LOAD Sep 6 00:31:01.326000 audit: BPF prog-id=37 op=UNLOAD Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit: BPF prog-id=51 op=LOAD Sep 6 00:31:01.327000 audit: BPF prog-id=27 op=UNLOAD Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit: BPF prog-id=52 op=LOAD Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.328000 audit: BPF prog-id=53 op=LOAD Sep 6 00:31:01.328000 audit: BPF prog-id=28 op=UNLOAD Sep 6 00:31:01.328000 audit: BPF prog-id=29 op=UNLOAD Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.331000 audit: BPF prog-id=54 op=LOAD Sep 6 00:31:01.331000 audit: BPF prog-id=44 op=UNLOAD Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit: BPF prog-id=55 op=LOAD Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.335000 audit: BPF prog-id=56 op=LOAD Sep 6 00:31:01.335000 audit: BPF prog-id=30 op=UNLOAD Sep 6 00:31:01.335000 audit: BPF prog-id=31 op=UNLOAD Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.336000 audit: BPF prog-id=57 op=LOAD Sep 6 00:31:01.336000 audit: BPF prog-id=32 op=UNLOAD Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit: BPF prog-id=58 op=LOAD Sep 6 00:31:01.338000 audit: BPF prog-id=33 op=UNLOAD Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit: BPF prog-id=59 op=LOAD Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:01.339000 audit: BPF prog-id=60 op=LOAD Sep 6 00:31:01.339000 audit: BPF prog-id=34 op=UNLOAD Sep 6 00:31:01.339000 audit: BPF prog-id=35 op=UNLOAD Sep 6 00:31:01.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:01.359058 systemd[1]: Started kubelet.service. Sep 6 00:31:01.368600 systemd[1]: Stopping kubelet.service... Sep 6 00:31:01.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:01.369159 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 00:31:01.369459 systemd[1]: Stopped kubelet.service. Sep 6 00:31:01.372289 systemd[1]: Starting kubelet.service... Sep 6 00:31:01.528204 systemd[1]: Started kubelet.service. Sep 6 00:31:01.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:01.645575 kubelet[1507]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:31:01.645575 kubelet[1507]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 00:31:01.645575 kubelet[1507]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:31:01.646290 kubelet[1507]: I0906 00:31:01.645720 1507 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 00:31:02.455164 kubelet[1507]: I0906 00:31:02.455059 1507 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 6 00:31:02.455164 kubelet[1507]: I0906 00:31:02.455136 1507 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 00:31:02.455706 kubelet[1507]: I0906 00:31:02.455666 1507 server.go:956] "Client rotation is on, will bootstrap in background" Sep 6 00:31:02.526020 kubelet[1507]: I0906 00:31:02.525960 1507 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 00:31:02.550902 kubelet[1507]: E0906 00:31:02.550836 1507 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 00:31:02.551246 kubelet[1507]: I0906 00:31:02.551219 1507 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 00:31:02.559948 kubelet[1507]: I0906 00:31:02.559900 1507 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 00:31:02.560791 kubelet[1507]: I0906 00:31:02.560732 1507 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 00:31:02.561228 kubelet[1507]: I0906 00:31:02.560909 1507 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.244.26.66","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 00:31:02.561601 kubelet[1507]: I0906 00:31:02.561574 1507 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 00:31:02.561816 kubelet[1507]: I0906 00:31:02.561792 1507 container_manager_linux.go:303] "Creating device plugin manager" Sep 6 00:31:02.562184 kubelet[1507]: I0906 00:31:02.562160 1507 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:31:02.566824 kubelet[1507]: I0906 00:31:02.566730 1507 kubelet.go:480] "Attempting to sync node with API server" Sep 6 00:31:02.567152 kubelet[1507]: I0906 00:31:02.567123 1507 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 00:31:02.567328 kubelet[1507]: I0906 00:31:02.567303 1507 kubelet.go:386] "Adding apiserver pod source" Sep 6 00:31:02.567516 kubelet[1507]: I0906 00:31:02.567491 1507 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 00:31:02.574170 kubelet[1507]: E0906 00:31:02.573673 1507 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:02.574170 kubelet[1507]: E0906 00:31:02.573787 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:02.583145 kubelet[1507]: I0906 00:31:02.583091 1507 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 00:31:02.584021 kubelet[1507]: I0906 00:31:02.583989 1507 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 6 00:31:02.585189 kubelet[1507]: W0906 00:31:02.585064 1507 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 00:31:02.590924 kubelet[1507]: I0906 00:31:02.590863 1507 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 00:31:02.591132 kubelet[1507]: I0906 00:31:02.590989 1507 server.go:1289] "Started kubelet" Sep 6 00:31:02.591969 kubelet[1507]: E0906 00:31:02.591931 1507 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.244.26.66\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 6 00:31:02.592280 kubelet[1507]: E0906 00:31:02.592247 1507 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 6 00:31:02.593763 kubelet[1507]: I0906 00:31:02.593674 1507 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 00:31:02.596972 kubelet[1507]: I0906 00:31:02.596902 1507 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 00:31:02.597262 kubelet[1507]: I0906 00:31:02.597231 1507 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 00:31:02.597602 kubelet[1507]: I0906 00:31:02.597543 1507 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 00:31:02.596000 audit[1507]: AVC avc: denied { mac_admin } for pid=1507 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:02.600043 kernel: kauditd_printk_skb: 176 callbacks suppressed Sep 6 00:31:02.600199 kernel: audit: type=1400 audit(1757118662.596:420): avc: denied { mac_admin } for pid=1507 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:02.596000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:31:02.596000 audit[1507]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000893620 a1=c000716b58 a2=c0008935f0 a3=25 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.617226 kernel: audit: type=1401 audit(1757118662.596:420): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:31:02.617557 kernel: audit: type=1300 audit(1757118662.596:420): arch=c000003e syscall=188 success=no exit=-22 a0=c000893620 a1=c000716b58 a2=c0008935f0 a3=25 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.618918 kubelet[1507]: I0906 00:31:02.618878 1507 server.go:317] "Adding debug handlers to kubelet server" Sep 6 00:31:02.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:31:02.623405 kubelet[1507]: I0906 00:31:02.623255 1507 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 00:31:02.627468 kernel: audit: type=1327 audit(1757118662.596:420): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:31:02.596000 audit[1507]: AVC avc: denied { mac_admin } for pid=1507 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:02.596000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:31:02.639005 kernel: audit: type=1400 audit(1757118662.596:421): avc: denied { mac_admin } for pid=1507 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:02.639190 kernel: audit: type=1401 audit(1757118662.596:421): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:31:02.639257 kernel: audit: type=1300 audit(1757118662.596:421): arch=c000003e syscall=188 success=no exit=-22 a0=c0004194a0 a1=c000716b70 a2=c0008936b0 a3=25 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.596000 audit[1507]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004194a0 a1=c000716b70 a2=c0008936b0 a3=25 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:31:02.654420 kernel: audit: type=1327 audit(1757118662.596:421): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:31:02.658885 kubelet[1507]: I0906 00:31:02.658839 1507 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 00:31:02.659567 kubelet[1507]: I0906 00:31:02.646815 1507 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 00:31:02.659650 kubelet[1507]: I0906 00:31:02.627377 1507 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 00:31:02.659729 kubelet[1507]: I0906 00:31:02.646890 1507 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 00:31:02.659885 kubelet[1507]: I0906 00:31:02.659856 1507 reconciler.go:26] "Reconciler: start to sync state" Sep 6 00:31:02.659971 kubelet[1507]: E0906 00:31:02.647168 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:02.663829 kubelet[1507]: I0906 00:31:02.663777 1507 factory.go:223] Registration of the systemd container factory successfully Sep 6 00:31:02.664002 kubelet[1507]: I0906 00:31:02.663958 1507 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 00:31:02.671049 kubelet[1507]: I0906 00:31:02.670980 1507 factory.go:223] Registration of the containerd container factory successfully Sep 6 00:31:02.687064 kubelet[1507]: E0906 00:31:02.681005 1507 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.26.66.18628a1d2ff115ea default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.26.66,UID:10.244.26.66,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.244.26.66,},FirstTimestamp:2025-09-06 00:31:02.590928362 +0000 UTC m=+1.047688103,LastTimestamp:2025-09-06 00:31:02.590928362 +0000 UTC m=+1.047688103,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.26.66,}" Sep 6 00:31:02.687064 kubelet[1507]: E0906 00:31:02.686214 1507 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 6 00:31:02.687064 kubelet[1507]: E0906 00:31:02.686367 1507 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.244.26.66\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 6 00:31:02.712519 kubelet[1507]: E0906 00:31:02.708449 1507 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.26.66.18628a1d36c7f430 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.26.66,UID:10.244.26.66,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.244.26.66 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.244.26.66,},FirstTimestamp:2025-09-06 00:31:02.705673264 +0000 UTC m=+1.162433001,LastTimestamp:2025-09-06 00:31:02.705673264 +0000 UTC m=+1.162433001,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.26.66,}" Sep 6 00:31:02.716842 kubelet[1507]: I0906 00:31:02.716745 1507 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 00:31:02.716842 kubelet[1507]: I0906 00:31:02.716783 1507 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 00:31:02.716842 kubelet[1507]: I0906 00:31:02.716837 1507 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:31:02.726415 kubelet[1507]: I0906 00:31:02.725161 1507 policy_none.go:49] "None policy: Start" Sep 6 00:31:02.726415 kubelet[1507]: I0906 00:31:02.725223 1507 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 00:31:02.726415 kubelet[1507]: I0906 00:31:02.725260 1507 state_mem.go:35] "Initializing new in-memory state store" Sep 6 00:31:02.727000 audit[1530]: NETFILTER_CFG table=mangle:2 family=10 entries=2 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:02.727000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff262c1180 a2=0 a3=7fff262c116c items=0 ppid=1507 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.736240 kubelet[1507]: I0906 00:31:02.736169 1507 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 6 00:31:02.742072 kernel: audit: type=1325 audit(1757118662.727:422): table=mangle:2 family=10 entries=2 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:02.742321 kernel: audit: type=1300 audit(1757118662.727:422): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff262c1180 a2=0 a3=7fff262c116c items=0 ppid=1507 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:31:02.743000 audit[1532]: NETFILTER_CFG table=mangle:3 family=10 entries=1 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:02.743000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb4846430 a2=0 a3=7ffcb484641c items=0 ppid=1507 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:31:02.745000 audit[1531]: NETFILTER_CFG table=mangle:4 family=2 entries=2 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.745000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcf0073b0 a2=0 a3=7ffdcf00739c items=0 ppid=1507 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:31:02.745950 systemd[1]: Created slice kubepods.slice. Sep 6 00:31:02.753000 audit[1534]: NETFILTER_CFG table=nat:5 family=10 entries=2 op=nft_register_chain pid=1534 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:02.753000 audit[1534]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcdbb79690 a2=0 a3=7ffcdbb7967c items=0 ppid=1507 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:31:02.754000 audit[1533]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.754000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe16be2b10 a2=0 a3=7ffe16be2afc items=0 ppid=1507 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:31:02.755481 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 00:31:02.759992 kubelet[1507]: E0906 00:31:02.759952 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:02.761000 audit[1535]: NETFILTER_CFG table=filter:7 family=10 entries=2 op=nft_register_chain pid=1535 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:02.761853 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 00:31:02.761000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc6dddc60 a2=0 a3=7fffc6dddc4c items=0 ppid=1507 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:31:02.771657 kubelet[1507]: E0906 00:31:02.771613 1507 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 6 00:31:02.771000 audit[1507]: AVC avc: denied { mac_admin } for pid=1507 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:02.771000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:31:02.771000 audit[1507]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000077cb0 a1=c0006d88a0 a2=c000077c50 a3=25 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.771000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:31:02.772893 kubelet[1507]: E0906 00:31:02.772861 1507 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 6 00:31:02.773651 kubelet[1507]: I0906 00:31:02.773625 1507 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 00:31:02.774054 kubelet[1507]: I0906 00:31:02.773892 1507 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 00:31:02.774881 kubelet[1507]: I0906 00:31:02.774856 1507 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 00:31:02.777894 kubelet[1507]: E0906 00:31:02.777861 1507 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 00:31:02.780556 kubelet[1507]: E0906 00:31:02.780520 1507 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.244.26.66\" not found" Sep 6 00:31:02.764000 audit[1537]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.764000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6af01cb0 a2=0 a3=7ffc6af01c9c items=0 ppid=1507 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:31:02.794000 audit[1543]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.794000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff95721300 a2=0 a3=7fff957212ec items=0 ppid=1507 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:31:02.877988 kubelet[1507]: I0906 00:31:02.876791 1507 kubelet_node_status.go:75] "Attempting to register node" node="10.244.26.66" Sep 6 00:31:02.890000 audit[1548]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.890000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe75e35440 a2=0 a3=7ffe75e3542c items=0 ppid=1507 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 00:31:02.893376 kubelet[1507]: I0906 00:31:02.892945 1507 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 6 00:31:02.893376 kubelet[1507]: I0906 00:31:02.893014 1507 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 6 00:31:02.893376 kubelet[1507]: I0906 00:31:02.893052 1507 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 00:31:02.893376 kubelet[1507]: I0906 00:31:02.893069 1507 kubelet.go:2436] "Starting kubelet main sync loop" Sep 6 00:31:02.896000 audit[1549]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.896000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbad40830 a2=0 a3=7fffbad4081c items=0 ppid=1507 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:31:02.900000 audit[1550]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.900000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdf50c7b40 a2=0 a3=7ffdf50c7b2c items=0 ppid=1507 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:31:02.902000 audit[1551]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:02.902000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda76860e0 a2=0 a3=7ffda76860cc items=0 ppid=1507 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:02.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:31:02.903608 kubelet[1507]: E0906 00:31:02.903571 1507 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 6 00:31:02.905799 kubelet[1507]: I0906 00:31:02.905687 1507 kubelet_node_status.go:78] "Successfully registered node" node="10.244.26.66" Sep 6 00:31:02.905799 kubelet[1507]: E0906 00:31:02.905790 1507 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.244.26.66\": node \"10.244.26.66\" not found" Sep 6 00:31:02.935340 kubelet[1507]: E0906 00:31:02.935060 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.037471 kubelet[1507]: E0906 00:31:03.036189 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.116794 sudo[1379]: pam_unix(sudo:session): session closed for user root Sep 6 00:31:03.117000 audit[1379]: USER_END pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:31:03.117000 audit[1379]: CRED_DISP pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:31:03.137058 kubelet[1507]: E0906 00:31:03.136992 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.238344 kubelet[1507]: E0906 00:31:03.238277 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.263640 sshd[1376]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:03.266000 audit[1376]: USER_END pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:03.266000 audit[1376]: CRED_DISP pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:03.269241 systemd-logind[1190]: Session 9 logged out. Waiting for processes to exit. Sep 6 00:31:03.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.26.66:22-139.178.89.65:51240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:03.269763 systemd[1]: sshd@8-10.244.26.66:22-139.178.89.65:51240.service: Deactivated successfully. Sep 6 00:31:03.271183 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 00:31:03.272884 systemd-logind[1190]: Removed session 9. Sep 6 00:31:03.339691 kubelet[1507]: E0906 00:31:03.339620 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.441195 kubelet[1507]: E0906 00:31:03.441093 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.459581 kubelet[1507]: I0906 00:31:03.459486 1507 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 6 00:31:03.460002 kubelet[1507]: I0906 00:31:03.459943 1507 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 00:31:03.542422 kubelet[1507]: E0906 00:31:03.542318 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.574896 kubelet[1507]: E0906 00:31:03.574751 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:03.645018 kubelet[1507]: E0906 00:31:03.644333 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.745946 kubelet[1507]: E0906 00:31:03.745881 1507 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.244.26.66\" not found" Sep 6 00:31:03.848404 kubelet[1507]: I0906 00:31:03.848350 1507 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 6 00:31:03.849570 env[1196]: time="2025-09-06T00:31:03.849470705Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 00:31:03.850561 kubelet[1507]: I0906 00:31:03.850532 1507 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 6 00:31:04.575595 kubelet[1507]: E0906 00:31:04.575530 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:04.575894 kubelet[1507]: I0906 00:31:04.575585 1507 apiserver.go:52] "Watching apiserver" Sep 6 00:31:04.612516 kubelet[1507]: E0906 00:31:04.612462 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:04.619961 systemd[1]: Created slice kubepods-besteffort-pod0006466a_7702_411a_a2b5_0fd3e72fade7.slice. Sep 6 00:31:04.651068 systemd[1]: Created slice kubepods-besteffort-pod117791c1_fbb7_4042_9f9c_c9f27121f2e3.slice. Sep 6 00:31:04.663409 kubelet[1507]: I0906 00:31:04.660218 1507 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 00:31:04.676602 kubelet[1507]: I0906 00:31:04.676452 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/117791c1-fbb7-4042-9f9c-c9f27121f2e3-xtables-lock\") pod \"kube-proxy-x989j\" (UID: \"117791c1-fbb7-4042-9f9c-c9f27121f2e3\") " pod="kube-system/kube-proxy-x989j" Sep 6 00:31:04.676947 kubelet[1507]: I0906 00:31:04.676915 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0006466a-7702-411a-a2b5-0fd3e72fade7-node-certs\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.677158 kubelet[1507]: I0906 00:31:04.677129 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-var-run-calico\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.677369 kubelet[1507]: I0906 00:31:04.677341 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b516e9d6-9aa7-421d-b567-565416c28334-socket-dir\") pod \"csi-node-driver-h86jk\" (UID: \"b516e9d6-9aa7-421d-b567-565416c28334\") " pod="calico-system/csi-node-driver-h86jk" Sep 6 00:31:04.677596 kubelet[1507]: I0906 00:31:04.677565 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9j8nj\" (UniqueName: \"kubernetes.io/projected/117791c1-fbb7-4042-9f9c-c9f27121f2e3-kube-api-access-9j8nj\") pod \"kube-proxy-x989j\" (UID: \"117791c1-fbb7-4042-9f9c-c9f27121f2e3\") " pod="kube-system/kube-proxy-x989j" Sep 6 00:31:04.677806 kubelet[1507]: I0906 00:31:04.677779 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-lib-modules\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.677994 kubelet[1507]: I0906 00:31:04.677968 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-xtables-lock\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.678186 kubelet[1507]: I0906 00:31:04.678160 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b516e9d6-9aa7-421d-b567-565416c28334-kubelet-dir\") pod \"csi-node-driver-h86jk\" (UID: \"b516e9d6-9aa7-421d-b567-565416c28334\") " pod="calico-system/csi-node-driver-h86jk" Sep 6 00:31:04.678418 kubelet[1507]: I0906 00:31:04.678366 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b516e9d6-9aa7-421d-b567-565416c28334-varrun\") pod \"csi-node-driver-h86jk\" (UID: \"b516e9d6-9aa7-421d-b567-565416c28334\") " pod="calico-system/csi-node-driver-h86jk" Sep 6 00:31:04.678701 kubelet[1507]: I0906 00:31:04.678675 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/117791c1-fbb7-4042-9f9c-c9f27121f2e3-lib-modules\") pod \"kube-proxy-x989j\" (UID: \"117791c1-fbb7-4042-9f9c-c9f27121f2e3\") " pod="kube-system/kube-proxy-x989j" Sep 6 00:31:04.678901 kubelet[1507]: I0906 00:31:04.678873 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-flexvol-driver-host\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.679095 kubelet[1507]: I0906 00:31:04.679067 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-policysync\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.679436 kubelet[1507]: I0906 00:31:04.679409 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-var-lib-calico\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.679590 kubelet[1507]: I0906 00:31:04.679563 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-94sbd\" (UniqueName: \"kubernetes.io/projected/b516e9d6-9aa7-421d-b567-565416c28334-kube-api-access-94sbd\") pod \"csi-node-driver-h86jk\" (UID: \"b516e9d6-9aa7-421d-b567-565416c28334\") " pod="calico-system/csi-node-driver-h86jk" Sep 6 00:31:04.679814 kubelet[1507]: I0906 00:31:04.679760 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/117791c1-fbb7-4042-9f9c-c9f27121f2e3-kube-proxy\") pod \"kube-proxy-x989j\" (UID: \"117791c1-fbb7-4042-9f9c-c9f27121f2e3\") " pod="kube-system/kube-proxy-x989j" Sep 6 00:31:04.679996 kubelet[1507]: I0906 00:31:04.679970 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-cni-bin-dir\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.680194 kubelet[1507]: I0906 00:31:04.680168 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-cni-log-dir\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.680467 kubelet[1507]: I0906 00:31:04.680441 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0006466a-7702-411a-a2b5-0fd3e72fade7-cni-net-dir\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.680663 kubelet[1507]: I0906 00:31:04.680637 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0006466a-7702-411a-a2b5-0fd3e72fade7-tigera-ca-bundle\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.680864 kubelet[1507]: I0906 00:31:04.680838 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zq4w5\" (UniqueName: \"kubernetes.io/projected/0006466a-7702-411a-a2b5-0fd3e72fade7-kube-api-access-zq4w5\") pod \"calico-node-z9tl2\" (UID: \"0006466a-7702-411a-a2b5-0fd3e72fade7\") " pod="calico-system/calico-node-z9tl2" Sep 6 00:31:04.681077 kubelet[1507]: I0906 00:31:04.681041 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b516e9d6-9aa7-421d-b567-565416c28334-registration-dir\") pod \"csi-node-driver-h86jk\" (UID: \"b516e9d6-9aa7-421d-b567-565416c28334\") " pod="calico-system/csi-node-driver-h86jk" Sep 6 00:31:04.784496 kubelet[1507]: I0906 00:31:04.784212 1507 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 00:31:04.786613 kubelet[1507]: E0906 00:31:04.786574 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.786849 kubelet[1507]: W0906 00:31:04.786817 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.787043 kubelet[1507]: E0906 00:31:04.787014 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.792172 kubelet[1507]: E0906 00:31:04.792123 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.792505 kubelet[1507]: W0906 00:31:04.792471 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.792665 kubelet[1507]: E0906 00:31:04.792637 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.792989 kubelet[1507]: E0906 00:31:04.792967 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.793188 kubelet[1507]: W0906 00:31:04.793162 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.793328 kubelet[1507]: E0906 00:31:04.793303 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.793794 kubelet[1507]: E0906 00:31:04.793772 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.794001 kubelet[1507]: W0906 00:31:04.793975 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.794168 kubelet[1507]: E0906 00:31:04.794142 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.795402 kubelet[1507]: E0906 00:31:04.795366 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.795541 kubelet[1507]: W0906 00:31:04.795514 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.799701 kubelet[1507]: E0906 00:31:04.799642 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.800610 kubelet[1507]: E0906 00:31:04.800583 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.800760 kubelet[1507]: W0906 00:31:04.800729 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.800892 kubelet[1507]: E0906 00:31:04.800867 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.801234 kubelet[1507]: E0906 00:31:04.801212 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.801405 kubelet[1507]: W0906 00:31:04.801357 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.801554 kubelet[1507]: E0906 00:31:04.801529 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.801982 kubelet[1507]: E0906 00:31:04.801960 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.802242 kubelet[1507]: W0906 00:31:04.802218 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.802443 kubelet[1507]: E0906 00:31:04.802366 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.802875 kubelet[1507]: E0906 00:31:04.802854 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.803056 kubelet[1507]: W0906 00:31:04.802975 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.803185 kubelet[1507]: E0906 00:31:04.803161 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.803752 kubelet[1507]: E0906 00:31:04.803725 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.803903 kubelet[1507]: W0906 00:31:04.803878 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.804024 kubelet[1507]: E0906 00:31:04.803999 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.804494 kubelet[1507]: E0906 00:31:04.804471 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.804607 kubelet[1507]: W0906 00:31:04.804582 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.804742 kubelet[1507]: E0906 00:31:04.804717 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.805091 kubelet[1507]: E0906 00:31:04.805071 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.805212 kubelet[1507]: W0906 00:31:04.805187 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.805345 kubelet[1507]: E0906 00:31:04.805321 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.805793 kubelet[1507]: E0906 00:31:04.805771 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.805905 kubelet[1507]: W0906 00:31:04.805880 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.806027 kubelet[1507]: E0906 00:31:04.806003 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.806374 kubelet[1507]: E0906 00:31:04.806353 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.806498 kubelet[1507]: W0906 00:31:04.806473 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.806610 kubelet[1507]: E0906 00:31:04.806586 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.806998 kubelet[1507]: E0906 00:31:04.806977 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.807125 kubelet[1507]: W0906 00:31:04.807100 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.807276 kubelet[1507]: E0906 00:31:04.807238 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.807646 kubelet[1507]: E0906 00:31:04.807625 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.807765 kubelet[1507]: W0906 00:31:04.807741 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.807884 kubelet[1507]: E0906 00:31:04.807860 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.808213 kubelet[1507]: E0906 00:31:04.808192 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.808373 kubelet[1507]: W0906 00:31:04.808347 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.808524 kubelet[1507]: E0906 00:31:04.808499 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.808918 kubelet[1507]: E0906 00:31:04.808897 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.809035 kubelet[1507]: W0906 00:31:04.809010 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.809147 kubelet[1507]: E0906 00:31:04.809123 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.809651 kubelet[1507]: E0906 00:31:04.809608 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.809800 kubelet[1507]: W0906 00:31:04.809775 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.809929 kubelet[1507]: E0906 00:31:04.809904 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.810282 kubelet[1507]: E0906 00:31:04.810247 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.810493 kubelet[1507]: W0906 00:31:04.810468 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.810617 kubelet[1507]: E0906 00:31:04.810593 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.811074 kubelet[1507]: E0906 00:31:04.811053 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.811186 kubelet[1507]: W0906 00:31:04.811161 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.811312 kubelet[1507]: E0906 00:31:04.811287 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.811749 kubelet[1507]: E0906 00:31:04.811728 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.811885 kubelet[1507]: W0906 00:31:04.811861 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.811998 kubelet[1507]: E0906 00:31:04.811973 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.812322 kubelet[1507]: E0906 00:31:04.812302 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.812459 kubelet[1507]: W0906 00:31:04.812434 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.812594 kubelet[1507]: E0906 00:31:04.812570 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.814713 kubelet[1507]: E0906 00:31:04.814682 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.815610 kubelet[1507]: W0906 00:31:04.815571 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.815703 kubelet[1507]: E0906 00:31:04.815611 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.831477 kubelet[1507]: E0906 00:31:04.828884 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.832869 kubelet[1507]: W0906 00:31:04.832836 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.833052 kubelet[1507]: E0906 00:31:04.833025 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.834187 kubelet[1507]: E0906 00:31:04.834162 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.834408 kubelet[1507]: W0906 00:31:04.834360 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.834542 kubelet[1507]: E0906 00:31:04.834517 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.835080 kubelet[1507]: E0906 00:31:04.835058 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.835311 kubelet[1507]: W0906 00:31:04.835285 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.835473 kubelet[1507]: E0906 00:31:04.835449 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.836364 kubelet[1507]: E0906 00:31:04.836334 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.836550 kubelet[1507]: W0906 00:31:04.836525 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.836717 kubelet[1507]: E0906 00:31:04.836693 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.837307 kubelet[1507]: E0906 00:31:04.837282 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.837485 kubelet[1507]: W0906 00:31:04.837453 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.837629 kubelet[1507]: E0906 00:31:04.837604 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.838098 kubelet[1507]: E0906 00:31:04.838067 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.838249 kubelet[1507]: W0906 00:31:04.838224 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.838441 kubelet[1507]: E0906 00:31:04.838371 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.838866 kubelet[1507]: E0906 00:31:04.838836 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.838998 kubelet[1507]: W0906 00:31:04.838973 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.839135 kubelet[1507]: E0906 00:31:04.839111 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.839588 kubelet[1507]: E0906 00:31:04.839567 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.839724 kubelet[1507]: W0906 00:31:04.839699 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.839861 kubelet[1507]: E0906 00:31:04.839837 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.840846 kubelet[1507]: E0906 00:31:04.840822 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.840996 kubelet[1507]: W0906 00:31:04.840970 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.841141 kubelet[1507]: E0906 00:31:04.841114 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.841720 kubelet[1507]: E0906 00:31:04.841697 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.841857 kubelet[1507]: W0906 00:31:04.841819 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.841993 kubelet[1507]: E0906 00:31:04.841968 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.842446 kubelet[1507]: E0906 00:31:04.842423 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.842637 kubelet[1507]: W0906 00:31:04.842610 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.842772 kubelet[1507]: E0906 00:31:04.842748 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.844192 kubelet[1507]: E0906 00:31:04.843371 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.844192 kubelet[1507]: W0906 00:31:04.843418 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.844192 kubelet[1507]: E0906 00:31:04.843437 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.844192 kubelet[1507]: E0906 00:31:04.844054 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.844192 kubelet[1507]: W0906 00:31:04.844068 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.844192 kubelet[1507]: E0906 00:31:04.844084 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.867631 kubelet[1507]: E0906 00:31:04.867595 1507 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:31:04.867856 kubelet[1507]: W0906 00:31:04.867825 1507 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:31:04.867984 kubelet[1507]: E0906 00:31:04.867957 1507 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:31:04.950803 env[1196]: time="2025-09-06T00:31:04.949542126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z9tl2,Uid:0006466a-7702-411a-a2b5-0fd3e72fade7,Namespace:calico-system,Attempt:0,}" Sep 6 00:31:04.963740 env[1196]: time="2025-09-06T00:31:04.963284068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x989j,Uid:117791c1-fbb7-4042-9f9c-c9f27121f2e3,Namespace:kube-system,Attempt:0,}" Sep 6 00:31:05.576636 kubelet[1507]: E0906 00:31:05.576488 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:06.333756 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount823194372.mount: Deactivated successfully. Sep 6 00:31:06.392447 env[1196]: time="2025-09-06T00:31:06.392344466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.397449 env[1196]: time="2025-09-06T00:31:06.397235856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.405682 env[1196]: time="2025-09-06T00:31:06.405616685Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.411439 env[1196]: time="2025-09-06T00:31:06.411336765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.421324 env[1196]: time="2025-09-06T00:31:06.421247446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.427349 env[1196]: time="2025-09-06T00:31:06.427286721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.443122 env[1196]: time="2025-09-06T00:31:06.443049212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.469551 env[1196]: time="2025-09-06T00:31:06.469488308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:06.522231 env[1196]: time="2025-09-06T00:31:06.522088311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:31:06.522231 env[1196]: time="2025-09-06T00:31:06.522177917Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:31:06.522621 env[1196]: time="2025-09-06T00:31:06.522197712Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:31:06.522621 env[1196]: time="2025-09-06T00:31:06.522464842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec933bc4f8804ba6c19c7e64da4382a5b96e1d6a763ba7b25a8e4b1f45903a67 pid=1614 runtime=io.containerd.runc.v2 Sep 6 00:31:06.528964 env[1196]: time="2025-09-06T00:31:06.528858029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:31:06.529213 env[1196]: time="2025-09-06T00:31:06.529155250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:31:06.529524 env[1196]: time="2025-09-06T00:31:06.529366141Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:31:06.529919 env[1196]: time="2025-09-06T00:31:06.529868034Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a pid=1616 runtime=io.containerd.runc.v2 Sep 6 00:31:06.552106 systemd[1]: Started cri-containerd-ec933bc4f8804ba6c19c7e64da4382a5b96e1d6a763ba7b25a8e4b1f45903a67.scope. Sep 6 00:31:06.565491 systemd[1]: Started cri-containerd-3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a.scope. Sep 6 00:31:06.577659 kubelet[1507]: E0906 00:31:06.577597 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.603000 audit: BPF prog-id=61 op=LOAD Sep 6 00:31:06.603000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.603000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1614 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393333626334663838303462613663313963376536346461343338 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1614 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393333626334663838303462613663313963376536346461343338 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.604000 audit: BPF prog-id=62 op=LOAD Sep 6 00:31:06.604000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000167cd0 items=0 ppid=1614 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393333626334663838303462613663313963376536346461343338 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.606000 audit: BPF prog-id=63 op=LOAD Sep 6 00:31:06.606000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000167d18 items=0 ppid=1614 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393333626334663838303462613663313963376536346461343338 Sep 6 00:31:06.607000 audit: BPF prog-id=63 op=UNLOAD Sep 6 00:31:06.607000 audit: BPF prog-id=62 op=UNLOAD Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { perfmon } for pid=1634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit[1634]: AVC avc: denied { bpf } for pid=1634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.607000 audit: BPF prog-id=64 op=LOAD Sep 6 00:31:06.607000 audit[1634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000398128 items=0 ppid=1614 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393333626334663838303462613663313963376536346461343338 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.613000 audit: BPF prog-id=65 op=LOAD Sep 6 00:31:06.614000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.614000 audit[1638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1616 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666364303564356361633932346431653734623461356662613930 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1616 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666364303564356361633932346431653734623461356662613930 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.615000 audit: BPF prog-id=66 op=LOAD Sep 6 00:31:06.615000 audit[1638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003483f0 items=0 ppid=1616 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666364303564356361633932346431653734623461356662613930 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit: BPF prog-id=67 op=LOAD Sep 6 00:31:06.616000 audit[1638]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000348438 items=0 ppid=1616 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666364303564356361633932346431653734623461356662613930 Sep 6 00:31:06.616000 audit: BPF prog-id=67 op=UNLOAD Sep 6 00:31:06.616000 audit: BPF prog-id=66 op=UNLOAD Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { perfmon } for pid=1638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit[1638]: AVC avc: denied { bpf } for pid=1638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:06.616000 audit: BPF prog-id=68 op=LOAD Sep 6 00:31:06.616000 audit[1638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000348848 items=0 ppid=1616 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666364303564356361633932346431653734623461356662613930 Sep 6 00:31:06.653431 env[1196]: time="2025-09-06T00:31:06.653341599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z9tl2,Uid:0006466a-7702-411a-a2b5-0fd3e72fade7,Namespace:calico-system,Attempt:0,} returns sandbox id \"3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a\"" Sep 6 00:31:06.658576 env[1196]: time="2025-09-06T00:31:06.658519125Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 00:31:06.660120 env[1196]: time="2025-09-06T00:31:06.660074017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x989j,Uid:117791c1-fbb7-4042-9f9c-c9f27121f2e3,Namespace:kube-system,Attempt:0,} returns sandbox id \"ec933bc4f8804ba6c19c7e64da4382a5b96e1d6a763ba7b25a8e4b1f45903a67\"" Sep 6 00:31:06.894836 kubelet[1507]: E0906 00:31:06.894683 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:07.577970 kubelet[1507]: E0906 00:31:07.577876 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:08.269562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2622117253.mount: Deactivated successfully. Sep 6 00:31:08.578751 kubelet[1507]: E0906 00:31:08.578634 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:08.673699 env[1196]: time="2025-09-06T00:31:08.673570945Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:08.676958 env[1196]: time="2025-09-06T00:31:08.676917786Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:08.678636 env[1196]: time="2025-09-06T00:31:08.678597580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:08.681337 env[1196]: time="2025-09-06T00:31:08.681291016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:08.682051 env[1196]: time="2025-09-06T00:31:08.682003043Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 00:31:08.685499 env[1196]: time="2025-09-06T00:31:08.685445246Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\"" Sep 6 00:31:08.692450 env[1196]: time="2025-09-06T00:31:08.692375292Z" level=info msg="CreateContainer within sandbox \"3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 00:31:08.714852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3619007677.mount: Deactivated successfully. Sep 6 00:31:08.722783 env[1196]: time="2025-09-06T00:31:08.722708973Z" level=info msg="CreateContainer within sandbox \"3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf\"" Sep 6 00:31:08.724128 env[1196]: time="2025-09-06T00:31:08.724090630Z" level=info msg="StartContainer for \"29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf\"" Sep 6 00:31:08.759406 systemd[1]: Started cri-containerd-29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf.scope. Sep 6 00:31:08.802840 kernel: kauditd_printk_skb: 157 callbacks suppressed Sep 6 00:31:08.803126 kernel: audit: type=1400 audit(1757118668.794:476): avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7faea45f5aa8 items=0 ppid=1616 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:08.819133 kernel: audit: type=1300 audit(1757118668.794:476): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7faea45f5aa8 items=0 ppid=1616 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:08.819346 kernel: audit: type=1327 audit(1757118668.794:476): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239656431343339323935626565666134653263396134663034363835 Sep 6 00:31:08.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239656431343339323935626565666134653263396134663034363835 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.825454 kernel: audit: type=1400 audit(1757118668.794:477): avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.832474 kernel: audit: type=1400 audit(1757118668.794:477): avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.841628 kernel: audit: type=1400 audit(1757118668.794:477): avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.841837 kernel: audit: type=1400 audit(1757118668.794:477): avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.852191 kernel: audit: type=1400 audit(1757118668.794:477): avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.859448 kernel: audit: type=1400 audit(1757118668.794:477): avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.869446 kernel: audit: type=1400 audit(1757118668.794:477): avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.794000 audit: BPF prog-id=69 op=LOAD Sep 6 00:31:08.794000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ba8 items=0 ppid=1616 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:08.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239656431343339323935626565666134653263396134663034363835 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.796000 audit: BPF prog-id=70 op=LOAD Sep 6 00:31:08.796000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7bf8 items=0 ppid=1616 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:08.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239656431343339323935626565666134653263396134663034363835 Sep 6 00:31:08.801000 audit: BPF prog-id=70 op=UNLOAD Sep 6 00:31:08.801000 audit: BPF prog-id=69 op=UNLOAD Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { perfmon } for pid=1691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit[1691]: AVC avc: denied { bpf } for pid=1691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:08.801000 audit: BPF prog-id=71 op=LOAD Sep 6 00:31:08.801000 audit[1691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7c88 items=0 ppid=1616 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:08.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239656431343339323935626565666134653263396134663034363835 Sep 6 00:31:08.874829 env[1196]: time="2025-09-06T00:31:08.872920765Z" level=info msg="StartContainer for \"29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf\" returns successfully" Sep 6 00:31:08.888994 systemd[1]: cri-containerd-29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf.scope: Deactivated successfully. Sep 6 00:31:08.892000 audit: BPF prog-id=71 op=UNLOAD Sep 6 00:31:08.895409 kubelet[1507]: E0906 00:31:08.895253 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:08.932139 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf-rootfs.mount: Deactivated successfully. Sep 6 00:31:08.996669 env[1196]: time="2025-09-06T00:31:08.996561558Z" level=info msg="shim disconnected" id=29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf Sep 6 00:31:08.996669 env[1196]: time="2025-09-06T00:31:08.996639620Z" level=warning msg="cleaning up after shim disconnected" id=29ed1439295beefa4e2c9a4f046857ec19807d328ef1cb06fd41f4b93f0a0caf namespace=k8s.io Sep 6 00:31:08.996669 env[1196]: time="2025-09-06T00:31:08.996659114Z" level=info msg="cleaning up dead shim" Sep 6 00:31:09.008734 env[1196]: time="2025-09-06T00:31:09.008644384Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:31:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1730 runtime=io.containerd.runc.v2\n" Sep 6 00:31:09.579144 kubelet[1507]: E0906 00:31:09.579056 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:10.520718 update_engine[1192]: I0906 00:31:10.520589 1192 update_attempter.cc:509] Updating boot flags... Sep 6 00:31:10.579958 kubelet[1507]: E0906 00:31:10.579869 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:10.722936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1727049148.mount: Deactivated successfully. Sep 6 00:31:10.893852 kubelet[1507]: E0906 00:31:10.893775 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:11.581050 kubelet[1507]: E0906 00:31:11.580963 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:12.062815 env[1196]: time="2025-09-06T00:31:12.062460710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:12.067637 env[1196]: time="2025-09-06T00:31:12.067551974Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1b2ea5e018dbbbd2efb8e5c540a6d3c463d77f250d3904429402ee057f09c64e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:12.069949 env[1196]: time="2025-09-06T00:31:12.069886925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:12.087270 env[1196]: time="2025-09-06T00:31:12.087202306Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bb04e9247da3aaeb96406b4d530a79fc865695b6807353dd1a28871df0d7f837,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:12.087994 env[1196]: time="2025-09-06T00:31:12.087953243Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\" returns image reference \"sha256:1b2ea5e018dbbbd2efb8e5c540a6d3c463d77f250d3904429402ee057f09c64e\"" Sep 6 00:31:12.091206 env[1196]: time="2025-09-06T00:31:12.090655176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 00:31:12.096480 env[1196]: time="2025-09-06T00:31:12.096399430Z" level=info msg="CreateContainer within sandbox \"ec933bc4f8804ba6c19c7e64da4382a5b96e1d6a763ba7b25a8e4b1f45903a67\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 00:31:12.115664 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1776595562.mount: Deactivated successfully. Sep 6 00:31:12.125703 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1406927182.mount: Deactivated successfully. Sep 6 00:31:12.136531 env[1196]: time="2025-09-06T00:31:12.136445862Z" level=info msg="CreateContainer within sandbox \"ec933bc4f8804ba6c19c7e64da4382a5b96e1d6a763ba7b25a8e4b1f45903a67\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"02f63139fe87cfe1938408522f542f4cdae2e245e249b539389f43669b999270\"" Sep 6 00:31:12.138143 env[1196]: time="2025-09-06T00:31:12.138092737Z" level=info msg="StartContainer for \"02f63139fe87cfe1938408522f542f4cdae2e245e249b539389f43669b999270\"" Sep 6 00:31:12.174823 systemd[1]: Started cri-containerd-02f63139fe87cfe1938408522f542f4cdae2e245e249b539389f43669b999270.scope. Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fbb43105328 items=0 ppid=1614 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663633313339666538376366653139333834303835323266353432 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit: BPF prog-id=72 op=LOAD Sep 6 00:31:12.205000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001e9fc8 items=0 ppid=1614 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663633313339666538376366653139333834303835323266353432 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.205000 audit: BPF prog-id=73 op=LOAD Sep 6 00:31:12.205000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003cc018 items=0 ppid=1614 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663633313339666538376366653139333834303835323266353432 Sep 6 00:31:12.206000 audit: BPF prog-id=73 op=UNLOAD Sep 6 00:31:12.206000 audit: BPF prog-id=72 op=UNLOAD Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:12.206000 audit: BPF prog-id=74 op=LOAD Sep 6 00:31:12.206000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003cc0a8 items=0 ppid=1614 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663633313339666538376366653139333834303835323266353432 Sep 6 00:31:12.236266 env[1196]: time="2025-09-06T00:31:12.236181043Z" level=info msg="StartContainer for \"02f63139fe87cfe1938408522f542f4cdae2e245e249b539389f43669b999270\" returns successfully" Sep 6 00:31:12.453000 audit[1832]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.453000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd14cf7930 a2=0 a3=7ffd14cf791c items=0 ppid=1781 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:31:12.458000 audit[1833]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.458000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3f852db0 a2=0 a3=7ffe3f852d9c items=0 ppid=1781 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:31:12.460000 audit[1835]: NETFILTER_CFG table=filter:16 family=10 entries=1 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.460000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb658d870 a2=0 a3=7ffdb658d85c items=0 ppid=1781 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:31:12.463000 audit[1836]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.463000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe54d65130 a2=0 a3=7ffe54d6511c items=0 ppid=1781 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:31:12.466000 audit[1838]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.466000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff114e23f0 a2=0 a3=7fff114e23dc items=0 ppid=1781 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:31:12.472000 audit[1839]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.472000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7d3964a0 a2=0 a3=7ffe7d39648c items=0 ppid=1781 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:31:12.571000 audit[1840]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.571000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe1a9352f0 a2=0 a3=7ffe1a9352dc items=0 ppid=1781 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:31:12.576000 audit[1842]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.576000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffecbfbe360 a2=0 a3=7ffecbfbe34c items=0 ppid=1781 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 00:31:12.582194 kubelet[1507]: E0906 00:31:12.582138 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:12.585000 audit[1845]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.585000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeef963fc0 a2=0 a3=7ffeef963fac items=0 ppid=1781 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 00:31:12.588000 audit[1846]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.588000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb0bf89b0 a2=0 a3=7fffb0bf899c items=0 ppid=1781 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:31:12.593000 audit[1848]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.593000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee5a8e7e0 a2=0 a3=7ffee5a8e7cc items=0 ppid=1781 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:31:12.595000 audit[1849]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.595000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3bb22b70 a2=0 a3=7ffe3bb22b5c items=0 ppid=1781 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:31:12.600000 audit[1851]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.600000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbfa146a0 a2=0 a3=7ffdbfa1468c items=0 ppid=1781 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:31:12.607000 audit[1854]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.607000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde92bd090 a2=0 a3=7ffde92bd07c items=0 ppid=1781 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 00:31:12.609000 audit[1855]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.609000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbd762cd0 a2=0 a3=7fffbd762cbc items=0 ppid=1781 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:31:12.613000 audit[1857]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.613000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8fb78250 a2=0 a3=7ffd8fb7823c items=0 ppid=1781 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:31:12.616000 audit[1858]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.616000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf77f3080 a2=0 a3=7ffdf77f306c items=0 ppid=1781 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:31:12.622000 audit[1860]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.622000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcc6cfef0 a2=0 a3=7ffdcc6cfedc items=0 ppid=1781 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:31:12.628000 audit[1863]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.628000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9195bc60 a2=0 a3=7fff9195bc4c items=0 ppid=1781 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:31:12.634000 audit[1866]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.634000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffefaf0ca00 a2=0 a3=7ffefaf0c9ec items=0 ppid=1781 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:31:12.636000 audit[1867]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.636000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff18602c20 a2=0 a3=7fff18602c0c items=0 ppid=1781 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:31:12.640000 audit[1869]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.640000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcece7aff0 a2=0 a3=7ffcece7afdc items=0 ppid=1781 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:31:12.673000 audit[1873]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.673000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd7f451160 a2=0 a3=7ffd7f45114c items=0 ppid=1781 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:31:12.678000 audit[1874]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.678000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd0541660 a2=0 a3=7fffd054164c items=0 ppid=1781 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:31:12.684000 audit[1876]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:31:12.684000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff7e0eb2f0 a2=0 a3=7fff7e0eb2dc items=0 ppid=1781 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:31:12.719000 audit[1882]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:31:12.719000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff2066ade0 a2=0 a3=7fff2066adcc items=0 ppid=1781 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:31:12.761000 audit[1882]: NETFILTER_CFG table=nat:40 family=2 entries=79 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:31:12.761000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=38092 a0=3 a1=7fff2066ade0 a2=0 a3=7fff2066adcc items=0 ppid=1781 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:31:12.780000 audit[1890]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.780000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff42a378c0 a2=0 a3=7fff42a378ac items=0 ppid=1781 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:31:12.785000 audit[1892]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.785000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd39143f00 a2=0 a3=7ffd39143eec items=0 ppid=1781 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 00:31:12.795000 audit[1895]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.795000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffbce2b340 a2=0 a3=7fffbce2b32c items=0 ppid=1781 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 00:31:12.797000 audit[1896]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.797000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd9d0a180 a2=0 a3=7fffd9d0a16c items=0 ppid=1781 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:31:12.805000 audit[1898]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.805000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff568ac970 a2=0 a3=7fff568ac95c items=0 ppid=1781 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:31:12.808000 audit[1899]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.808000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc88002c0 a2=0 a3=7fffc88002ac items=0 ppid=1781 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:31:12.813000 audit[1901]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.813000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9f06fe60 a2=0 a3=7ffe9f06fe4c items=0 ppid=1781 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.813000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 00:31:12.821000 audit[1904]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.821000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffca52dd3a0 a2=0 a3=7ffca52dd38c items=0 ppid=1781 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:31:12.823000 audit[1905]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.823000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0c6b4b80 a2=0 a3=7fff0c6b4b6c items=0 ppid=1781 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:31:12.829000 audit[1907]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.829000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff11dbf6b0 a2=0 a3=7fff11dbf69c items=0 ppid=1781 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:31:12.830000 audit[1908]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.830000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc38b130a0 a2=0 a3=7ffc38b1308c items=0 ppid=1781 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:31:12.834000 audit[1910]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.834000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7ad0d890 a2=0 a3=7ffe7ad0d87c items=0 ppid=1781 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:31:12.842000 audit[1913]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.842000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd927e30a0 a2=0 a3=7ffd927e308c items=0 ppid=1781 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:31:12.849000 audit[1916]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.849000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd0d9a1f0 a2=0 a3=7fffd0d9a1dc items=0 ppid=1781 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 00:31:12.851000 audit[1917]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.851000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd5fbc4370 a2=0 a3=7ffd5fbc435c items=0 ppid=1781 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:31:12.855000 audit[1919]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.855000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe8d616d00 a2=0 a3=7ffe8d616cec items=0 ppid=1781 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:31:12.863000 audit[1922]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.863000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff38f29b40 a2=0 a3=7fff38f29b2c items=0 ppid=1781 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:31:12.866000 audit[1923]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.866000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff185d190 a2=0 a3=7ffff185d17c items=0 ppid=1781 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:31:12.870000 audit[1925]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.870000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1cf193f0 a2=0 a3=7ffd1cf193dc items=0 ppid=1781 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:31:12.872000 audit[1926]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.872000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe8fcdbc0 a2=0 a3=7fffe8fcdbac items=0 ppid=1781 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:31:12.888000 audit[1928]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.888000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc3e08300 a2=0 a3=7fffc3e082ec items=0 ppid=1781 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:31:12.895045 kubelet[1507]: E0906 00:31:12.894466 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:12.900000 audit[1931]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:31:12.900000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5a03bf10 a2=0 a3=7ffe5a03befc items=0 ppid=1781 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:31:12.913000 audit[1933]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:31:12.913000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe5e039660 a2=0 a3=7ffe5e03964c items=0 ppid=1781 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.913000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:31:12.914000 audit[1933]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:31:12.914000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe5e039660 a2=0 a3=7ffe5e03964c items=0 ppid=1781 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:12.914000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:31:13.136147 kubelet[1507]: I0906 00:31:13.135948 1507 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-x989j" podStartSLOduration=4.707855127 podStartE2EDuration="10.135884683s" podCreationTimestamp="2025-09-06 00:31:03 +0000 UTC" firstStartedPulling="2025-09-06 00:31:06.662051811 +0000 UTC m=+5.118811546" lastFinishedPulling="2025-09-06 00:31:12.090081355 +0000 UTC m=+10.546841102" observedRunningTime="2025-09-06 00:31:13.135604315 +0000 UTC m=+11.592364063" watchObservedRunningTime="2025-09-06 00:31:13.135884683 +0000 UTC m=+11.592644431" Sep 6 00:31:13.582976 kubelet[1507]: E0906 00:31:13.582881 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:14.584758 kubelet[1507]: E0906 00:31:14.584620 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:14.895264 kubelet[1507]: E0906 00:31:14.895052 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:15.588096 kubelet[1507]: E0906 00:31:15.587801 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:16.588547 kubelet[1507]: E0906 00:31:16.588491 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:16.894594 kubelet[1507]: E0906 00:31:16.894194 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:17.590328 kubelet[1507]: E0906 00:31:17.590261 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:18.591411 kubelet[1507]: E0906 00:31:18.591284 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:18.896860 kubelet[1507]: E0906 00:31:18.895798 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:19.591596 kubelet[1507]: E0906 00:31:19.591470 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:20.592625 kubelet[1507]: E0906 00:31:20.592540 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:20.896517 kubelet[1507]: E0906 00:31:20.894896 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:21.592925 kubelet[1507]: E0906 00:31:21.592847 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:22.567950 kubelet[1507]: E0906 00:31:22.567854 1507 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:22.594426 kubelet[1507]: E0906 00:31:22.594286 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:22.901405 kubelet[1507]: E0906 00:31:22.900647 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:23.289673 env[1196]: time="2025-09-06T00:31:23.289130894Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:23.296510 env[1196]: time="2025-09-06T00:31:23.296431887Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:23.301419 env[1196]: time="2025-09-06T00:31:23.301324811Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:23.306900 env[1196]: time="2025-09-06T00:31:23.306827224Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:23.308270 env[1196]: time="2025-09-06T00:31:23.308212600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 00:31:23.316939 env[1196]: time="2025-09-06T00:31:23.316595162Z" level=info msg="CreateContainer within sandbox \"3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 00:31:23.359528 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1519953558.mount: Deactivated successfully. Sep 6 00:31:23.388847 env[1196]: time="2025-09-06T00:31:23.388757386Z" level=info msg="CreateContainer within sandbox \"3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6\"" Sep 6 00:31:23.391857 env[1196]: time="2025-09-06T00:31:23.391810667Z" level=info msg="StartContainer for \"a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6\"" Sep 6 00:31:23.487496 systemd[1]: Started cri-containerd-a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6.scope. Sep 6 00:31:23.549000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.552333 kernel: kauditd_printk_skb: 230 callbacks suppressed Sep 6 00:31:23.552509 kernel: audit: type=1400 audit(1757118683.549:540): avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.549000 audit[1941]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fc7ab975228 items=0 ppid=1616 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:23.565176 kernel: audit: type=1300 audit(1757118683.549:540): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fc7ab975228 items=0 ppid=1616 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:23.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313130363034343334343761633738366662383834326463383265 Sep 6 00:31:23.573636 kernel: audit: type=1327 audit(1757118683.549:540): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313130363034343334343761633738366662383834326463383265 Sep 6 00:31:23.574075 kernel: audit: type=1400 audit(1757118683.550:541): avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.584289 kernel: audit: type=1400 audit(1757118683.550:541): avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.613309 kernel: audit: type=1400 audit(1757118683.550:541): avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.613508 kernel: audit: type=1400 audit(1757118683.550:541): avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.613576 kernel: audit: type=1400 audit(1757118683.550:541): avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.613981 kubelet[1507]: E0906 00:31:23.601282 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:23.626539 kernel: audit: type=1400 audit(1757118683.550:541): avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.635405 kernel: audit: type=1400 audit(1757118683.550:541): avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.550000 audit: BPF prog-id=75 op=LOAD Sep 6 00:31:23.550000 audit[1941]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c5c88 items=0 ppid=1616 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:23.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313130363034343334343761633738366662383834326463383265 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit: BPF prog-id=76 op=LOAD Sep 6 00:31:23.564000 audit[1941]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002c5cd8 items=0 ppid=1616 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:23.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313130363034343334343761633738366662383834326463383265 Sep 6 00:31:23.564000 audit: BPF prog-id=76 op=UNLOAD Sep 6 00:31:23.564000 audit: BPF prog-id=75 op=UNLOAD Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:23.564000 audit: BPF prog-id=77 op=LOAD Sep 6 00:31:23.564000 audit[1941]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002c5d68 items=0 ppid=1616 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:23.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313130363034343334343761633738366662383834326463383265 Sep 6 00:31:23.659738 env[1196]: time="2025-09-06T00:31:23.659645758Z" level=info msg="StartContainer for \"a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6\" returns successfully" Sep 6 00:31:24.602325 kubelet[1507]: E0906 00:31:24.602224 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:24.894288 kubelet[1507]: E0906 00:31:24.894117 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:25.117246 systemd[1]: cri-containerd-a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6.scope: Deactivated successfully. Sep 6 00:31:25.117566 systemd[1]: cri-containerd-a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6.scope: Consumed 1.132s CPU time. Sep 6 00:31:25.129000 audit: BPF prog-id=77 op=UNLOAD Sep 6 00:31:25.168632 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6-rootfs.mount: Deactivated successfully. Sep 6 00:31:25.301188 kubelet[1507]: I0906 00:31:25.199324 1507 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 00:31:25.425331 env[1196]: time="2025-09-06T00:31:25.422796018Z" level=info msg="shim disconnected" id=a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6 Sep 6 00:31:25.425331 env[1196]: time="2025-09-06T00:31:25.422875343Z" level=warning msg="cleaning up after shim disconnected" id=a711060443447ac786fb8842dc82ecfb2c86b460d826b5f2dc1a989b582652b6 namespace=k8s.io Sep 6 00:31:25.425331 env[1196]: time="2025-09-06T00:31:25.422894770Z" level=info msg="cleaning up dead shim" Sep 6 00:31:25.455802 env[1196]: time="2025-09-06T00:31:25.454915430Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:31:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1983 runtime=io.containerd.runc.v2\n" Sep 6 00:31:25.602999 kubelet[1507]: E0906 00:31:25.602913 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:26.102313 env[1196]: time="2025-09-06T00:31:26.102253273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 00:31:26.603698 kubelet[1507]: E0906 00:31:26.603581 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:26.905474 systemd[1]: Created slice kubepods-besteffort-podb516e9d6_9aa7_421d_b567_565416c28334.slice. Sep 6 00:31:26.913191 env[1196]: time="2025-09-06T00:31:26.912688474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h86jk,Uid:b516e9d6-9aa7-421d-b567-565416c28334,Namespace:calico-system,Attempt:0,}" Sep 6 00:31:27.032157 env[1196]: time="2025-09-06T00:31:27.032023648Z" level=error msg="Failed to destroy network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:27.034354 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159-shm.mount: Deactivated successfully. Sep 6 00:31:27.035658 env[1196]: time="2025-09-06T00:31:27.035589285Z" level=error msg="encountered an error cleaning up failed sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:27.035776 env[1196]: time="2025-09-06T00:31:27.035686253Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h86jk,Uid:b516e9d6-9aa7-421d-b567-565416c28334,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:27.036493 kubelet[1507]: E0906 00:31:27.036164 1507 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:27.036493 kubelet[1507]: E0906 00:31:27.036328 1507 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h86jk" Sep 6 00:31:27.036493 kubelet[1507]: E0906 00:31:27.036443 1507 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h86jk" Sep 6 00:31:27.037088 kubelet[1507]: E0906 00:31:27.036560 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-h86jk_calico-system(b516e9d6-9aa7-421d-b567-565416c28334)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-h86jk_calico-system(b516e9d6-9aa7-421d-b567-565416c28334)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:27.105938 kubelet[1507]: I0906 00:31:27.104739 1507 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:31:27.106697 env[1196]: time="2025-09-06T00:31:27.106606722Z" level=info msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\"" Sep 6 00:31:27.155454 env[1196]: time="2025-09-06T00:31:27.155349053Z" level=error msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" failed" error="failed to destroy network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:27.156132 kubelet[1507]: E0906 00:31:27.156055 1507 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:31:27.156314 kubelet[1507]: E0906 00:31:27.156168 1507 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159"} Sep 6 00:31:27.156314 kubelet[1507]: E0906 00:31:27.156275 1507 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b516e9d6-9aa7-421d-b567-565416c28334\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:31:27.157308 kubelet[1507]: E0906 00:31:27.157251 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b516e9d6-9aa7-421d-b567-565416c28334\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:27.603887 kubelet[1507]: E0906 00:31:27.603747 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:28.604775 kubelet[1507]: E0906 00:31:28.604717 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:29.605842 kubelet[1507]: E0906 00:31:29.605753 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:30.607176 kubelet[1507]: E0906 00:31:30.606952 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:31.607781 kubelet[1507]: E0906 00:31:31.607675 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:32.608823 kubelet[1507]: E0906 00:31:32.608652 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:33.609696 kubelet[1507]: E0906 00:31:33.609617 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:34.613934 kubelet[1507]: E0906 00:31:34.613880 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:35.438881 systemd[1]: Created slice kubepods-besteffort-podeba64511_09e2_4ed5_b7cc_ab31e5048cbb.slice. Sep 6 00:31:35.555848 kubelet[1507]: I0906 00:31:35.555717 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-29474\" (UniqueName: \"kubernetes.io/projected/eba64511-09e2-4ed5-b7cc-ab31e5048cbb-kube-api-access-29474\") pod \"nginx-deployment-7fcdb87857-qrdd5\" (UID: \"eba64511-09e2-4ed5-b7cc-ab31e5048cbb\") " pod="default/nginx-deployment-7fcdb87857-qrdd5" Sep 6 00:31:35.614926 kubelet[1507]: E0906 00:31:35.614859 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:36.047841 env[1196]: time="2025-09-06T00:31:36.047565011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-qrdd5,Uid:eba64511-09e2-4ed5-b7cc-ab31e5048cbb,Namespace:default,Attempt:0,}" Sep 6 00:31:36.219090 env[1196]: time="2025-09-06T00:31:36.218989871Z" level=error msg="Failed to destroy network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:36.221724 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1-shm.mount: Deactivated successfully. Sep 6 00:31:36.223307 env[1196]: time="2025-09-06T00:31:36.223169921Z" level=error msg="encountered an error cleaning up failed sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:36.223431 env[1196]: time="2025-09-06T00:31:36.223272192Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-qrdd5,Uid:eba64511-09e2-4ed5-b7cc-ab31e5048cbb,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:36.225020 kubelet[1507]: E0906 00:31:36.224954 1507 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:36.225235 kubelet[1507]: E0906 00:31:36.225115 1507 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-qrdd5" Sep 6 00:31:36.225235 kubelet[1507]: E0906 00:31:36.225172 1507 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-qrdd5" Sep 6 00:31:36.225433 kubelet[1507]: E0906 00:31:36.225299 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-qrdd5_default(eba64511-09e2-4ed5-b7cc-ab31e5048cbb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-qrdd5_default(eba64511-09e2-4ed5-b7cc-ab31e5048cbb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-qrdd5" podUID="eba64511-09e2-4ed5-b7cc-ab31e5048cbb" Sep 6 00:31:36.616047 kubelet[1507]: E0906 00:31:36.615942 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:37.143730 kubelet[1507]: I0906 00:31:37.143677 1507 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:31:37.144807 env[1196]: time="2025-09-06T00:31:37.144732546Z" level=info msg="StopPodSandbox for \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\"" Sep 6 00:31:37.198631 env[1196]: time="2025-09-06T00:31:37.198545846Z" level=error msg="StopPodSandbox for \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\" failed" error="failed to destroy network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:37.199248 kubelet[1507]: E0906 00:31:37.199168 1507 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:31:37.199393 kubelet[1507]: E0906 00:31:37.199264 1507 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1"} Sep 6 00:31:37.199393 kubelet[1507]: E0906 00:31:37.199330 1507 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eba64511-09e2-4ed5-b7cc-ab31e5048cbb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:31:37.199593 kubelet[1507]: E0906 00:31:37.199399 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eba64511-09e2-4ed5-b7cc-ab31e5048cbb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-qrdd5" podUID="eba64511-09e2-4ed5-b7cc-ab31e5048cbb" Sep 6 00:31:37.616652 kubelet[1507]: E0906 00:31:37.616581 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:38.617439 kubelet[1507]: E0906 00:31:38.617306 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:39.618411 kubelet[1507]: E0906 00:31:39.618290 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:39.896823 env[1196]: time="2025-09-06T00:31:39.896607493Z" level=info msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\"" Sep 6 00:31:39.967595 env[1196]: time="2025-09-06T00:31:39.967487175Z" level=error msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" failed" error="failed to destroy network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:31:39.968009 kubelet[1507]: E0906 00:31:39.967912 1507 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:31:39.968125 kubelet[1507]: E0906 00:31:39.968045 1507 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159"} Sep 6 00:31:39.968197 kubelet[1507]: E0906 00:31:39.968152 1507 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b516e9d6-9aa7-421d-b567-565416c28334\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:31:39.968474 kubelet[1507]: E0906 00:31:39.968236 1507 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b516e9d6-9aa7-421d-b567-565416c28334\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h86jk" podUID="b516e9d6-9aa7-421d-b567-565416c28334" Sep 6 00:31:40.610619 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 00:31:40.610855 kernel: audit: type=1130 audit(1757118700.601:547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.26.66:22-64.226.104.126:6103 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:40.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.26.66:22-64.226.104.126:6103 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:40.601473 systemd[1]: Started sshd@9-10.244.26.66:22-64.226.104.126:6103.service. Sep 6 00:31:40.619145 kubelet[1507]: E0906 00:31:40.619072 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:41.575705 sshd[2102]: kex protocol error: type 20 seq 2 [preauth] Sep 6 00:31:41.575705 sshd[2102]: kex protocol error: type 30 seq 3 [preauth] Sep 6 00:31:41.619658 kubelet[1507]: E0906 00:31:41.619578 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:42.567758 kubelet[1507]: E0906 00:31:42.567678 1507 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:42.620642 kubelet[1507]: E0906 00:31:42.620560 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:42.630277 sshd[2102]: kex protocol error: type 20 seq 4 [preauth] Sep 6 00:31:42.630277 sshd[2102]: kex protocol error: type 30 seq 5 [preauth] Sep 6 00:31:43.424781 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2194207443.mount: Deactivated successfully. Sep 6 00:31:43.470435 env[1196]: time="2025-09-06T00:31:43.470292748Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:43.472338 env[1196]: time="2025-09-06T00:31:43.472300411Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:43.474251 env[1196]: time="2025-09-06T00:31:43.474192545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:43.476142 env[1196]: time="2025-09-06T00:31:43.476102529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:43.476818 env[1196]: time="2025-09-06T00:31:43.476761679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 00:31:43.511226 env[1196]: time="2025-09-06T00:31:43.511154048Z" level=info msg="CreateContainer within sandbox \"3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 00:31:43.539078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3128002885.mount: Deactivated successfully. Sep 6 00:31:43.547470 env[1196]: time="2025-09-06T00:31:43.547366871Z" level=info msg="CreateContainer within sandbox \"3afcd05d5cac924d1e74b4a5fba90b9d5457d860ce58276c06af14836928bf3a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0e9e767c0f5c72c06dc0a389796932bd7aa07789aecf49ecd6af4f6843395156\"" Sep 6 00:31:43.548682 env[1196]: time="2025-09-06T00:31:43.548504629Z" level=info msg="StartContainer for \"0e9e767c0f5c72c06dc0a389796932bd7aa07789aecf49ecd6af4f6843395156\"" Sep 6 00:31:43.585912 systemd[1]: Started cri-containerd-0e9e767c0f5c72c06dc0a389796932bd7aa07789aecf49ecd6af4f6843395156.scope. Sep 6 00:31:43.621064 kubelet[1507]: E0906 00:31:43.621015 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.649429 kernel: audit: type=1400 audit(1757118703.642:548): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa04074f148 items=0 ppid=1616 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:43.660623 kernel: audit: type=1300 audit(1757118703.642:548): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa04074f148 items=0 ppid=1616 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:43.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396537363763306635633732633036646330613338393739363933 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.673764 kernel: audit: type=1327 audit(1757118703.642:548): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396537363763306635633732633036646330613338393739363933 Sep 6 00:31:43.674012 kernel: audit: type=1400 audit(1757118703.642:549): avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.685028 kernel: audit: type=1400 audit(1757118703.642:549): avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.685374 kernel: audit: type=1400 audit(1757118703.642:549): avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.693426 kernel: audit: type=1400 audit(1757118703.642:549): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.718893 kernel: audit: type=1400 audit(1757118703.642:549): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.719109 kernel: audit: type=1400 audit(1757118703.642:549): avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.642000 audit: BPF prog-id=78 op=LOAD Sep 6 00:31:43.642000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c2218 items=0 ppid=1616 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:43.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396537363763306635633732633036646330613338393739363933 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit: BPF prog-id=79 op=LOAD Sep 6 00:31:43.660000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c2268 items=0 ppid=1616 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:43.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396537363763306635633732633036646330613338393739363933 Sep 6 00:31:43.660000 audit: BPF prog-id=79 op=UNLOAD Sep 6 00:31:43.660000 audit: BPF prog-id=78 op=UNLOAD Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:43.660000 audit: BPF prog-id=80 op=LOAD Sep 6 00:31:43.660000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c22f8 items=0 ppid=1616 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:43.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065396537363763306635633732633036646330613338393739363933 Sep 6 00:31:43.738267 env[1196]: time="2025-09-06T00:31:43.738101558Z" level=info msg="StartContainer for \"0e9e767c0f5c72c06dc0a389796932bd7aa07789aecf49ecd6af4f6843395156\" returns successfully" Sep 6 00:31:43.924129 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 00:31:43.924444 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 00:31:44.234109 kubelet[1507]: I0906 00:31:44.233540 1507 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-z9tl2" podStartSLOduration=4.412897985 podStartE2EDuration="41.233498243s" podCreationTimestamp="2025-09-06 00:31:03 +0000 UTC" firstStartedPulling="2025-09-06 00:31:06.657509571 +0000 UTC m=+5.114269324" lastFinishedPulling="2025-09-06 00:31:43.478109851 +0000 UTC m=+41.934869582" observedRunningTime="2025-09-06 00:31:44.229515119 +0000 UTC m=+42.686274861" watchObservedRunningTime="2025-09-06 00:31:44.233498243 +0000 UTC m=+42.690257995" Sep 6 00:31:44.622088 kubelet[1507]: E0906 00:31:44.621983 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:44.639086 sshd[2102]: kex protocol error: type 20 seq 6 [preauth] Sep 6 00:31:44.639086 sshd[2102]: kex protocol error: type 30 seq 7 [preauth] Sep 6 00:31:45.214754 systemd[1]: run-containerd-runc-k8s.io-0e9e767c0f5c72c06dc0a389796932bd7aa07789aecf49ecd6af4f6843395156-runc.Vqn11d.mount: Deactivated successfully. Sep 6 00:31:45.623488 kubelet[1507]: E0906 00:31:45.623311 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:45.701000 audit[2256]: AVC avc: denied { write } for pid=2256 comm="tee" name="fd" dev="proc" ino=22617 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.705642 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 00:31:45.705808 kernel: audit: type=1400 audit(1757118705.701:554): avc: denied { write } for pid=2256 comm="tee" name="fd" dev="proc" ino=22617 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.701000 audit[2256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcaaa227d5 a2=241 a3=1b6 items=1 ppid=2223 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.721423 kernel: audit: type=1300 audit(1757118705.701:554): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcaaa227d5 a2=241 a3=1b6 items=1 ppid=2223 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.701000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 00:31:45.701000 audit: PATH item=0 name="/dev/fd/63" inode=21812 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.731090 kernel: audit: type=1307 audit(1757118705.701:554): cwd="/etc/service/enabled/bird/log" Sep 6 00:31:45.731374 kernel: audit: type=1302 audit(1757118705.701:554): item=0 name="/dev/fd/63" inode=21812 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.701000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.738410 kernel: audit: type=1327 audit(1757118705.701:554): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.742000 audit[2251]: AVC avc: denied { write } for pid=2251 comm="tee" name="fd" dev="proc" ino=21825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.748431 kernel: audit: type=1400 audit(1757118705.742:555): avc: denied { write } for pid=2251 comm="tee" name="fd" dev="proc" ino=21825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.748683 kernel: audit: type=1300 audit(1757118705.742:555): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc114077d4 a2=241 a3=1b6 items=1 ppid=2228 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.742000 audit[2251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc114077d4 a2=241 a3=1b6 items=1 ppid=2228 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.742000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 00:31:45.742000 audit: PATH item=0 name="/dev/fd/63" inode=22604 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.766120 kernel: audit: type=1307 audit(1757118705.742:555): cwd="/etc/service/enabled/bird6/log" Sep 6 00:31:45.766465 kernel: audit: type=1302 audit(1757118705.742:555): item=0 name="/dev/fd/63" inode=22604 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.742000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.757000 audit[2274]: AVC avc: denied { write } for pid=2274 comm="tee" name="fd" dev="proc" ino=22629 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.757000 audit[2274]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff213077d4 a2=241 a3=1b6 items=1 ppid=2226 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.757000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 00:31:45.757000 audit: PATH item=0 name="/dev/fd/63" inode=21821 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.757000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.768000 audit[2282]: AVC avc: denied { write } for pid=2282 comm="tee" name="fd" dev="proc" ino=22633 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.774422 kernel: audit: type=1327 audit(1757118705.742:555): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.785000 audit[2278]: AVC avc: denied { write } for pid=2278 comm="tee" name="fd" dev="proc" ino=22638 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.785000 audit[2278]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcce477d4 a2=241 a3=1b6 items=1 ppid=2232 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.785000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 00:31:45.789000 audit[2280]: AVC avc: denied { write } for pid=2280 comm="tee" name="fd" dev="proc" ino=22642 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.789000 audit[2280]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeca6277c4 a2=241 a3=1b6 items=1 ppid=2235 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.790000 audit[2277]: AVC avc: denied { write } for pid=2277 comm="tee" name="fd" dev="proc" ino=22644 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:31:45.789000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 00:31:45.789000 audit: PATH item=0 name="/dev/fd/63" inode=22625 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.789000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.790000 audit[2277]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9323c7c5 a2=241 a3=1b6 items=1 ppid=2225 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.790000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 00:31:45.790000 audit: PATH item=0 name="/dev/fd/63" inode=22622 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.768000 audit[2282]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdda51c7d6 a2=241 a3=1b6 items=1 ppid=2231 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:45.768000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 00:31:45.768000 audit: PATH item=0 name="/dev/fd/63" inode=22626 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.768000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:45.785000 audit: PATH item=0 name="/dev/fd/63" inode=21824 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:31:45.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.284000 audit: BPF prog-id=81 op=LOAD Sep 6 00:31:46.284000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee65fa520 a2=98 a3=1fffffffffffffff items=0 ppid=2234 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.284000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:31:46.286000 audit: BPF prog-id=81 op=UNLOAD Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.286000 audit: BPF prog-id=82 op=LOAD Sep 6 00:31:46.286000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee65fa400 a2=94 a3=3 items=0 ppid=2234 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.286000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:31:46.287000 audit: BPF prog-id=82 op=UNLOAD Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.287000 audit: BPF prog-id=83 op=LOAD Sep 6 00:31:46.287000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee65fa440 a2=94 a3=7ffee65fa620 items=0 ppid=2234 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.287000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:31:46.290000 audit: BPF prog-id=83 op=UNLOAD Sep 6 00:31:46.290000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.290000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffee65fa510 a2=50 a3=a000000085 items=0 ppid=2234 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.290000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.295000 audit: BPF prog-id=84 op=LOAD Sep 6 00:31:46.295000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff56dcd050 a2=98 a3=3 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.295000 audit: BPF prog-id=84 op=UNLOAD Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit: BPF prog-id=85 op=LOAD Sep 6 00:31:46.296000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff56dcce40 a2=94 a3=54428f items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.296000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.296000 audit: BPF prog-id=85 op=UNLOAD Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.296000 audit: BPF prog-id=86 op=LOAD Sep 6 00:31:46.296000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff56dcce70 a2=94 a3=2 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.296000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.300000 audit: BPF prog-id=86 op=UNLOAD Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.480000 audit: BPF prog-id=87 op=LOAD Sep 6 00:31:46.480000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff56dccd30 a2=94 a3=1 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.480000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.481000 audit: BPF prog-id=87 op=UNLOAD Sep 6 00:31:46.481000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.481000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff56dcce00 a2=50 a3=7fff56dccee0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.495000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.495000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff56dccd40 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.496000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.496000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56dccd70 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.496000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.496000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56dccc80 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.496000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.496000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff56dccd90 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.496000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.496000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff56dccd70 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.497000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.497000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff56dccd60 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.497000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.497000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.497000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff56dccd90 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.497000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.497000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.497000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56dccd70 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.497000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.498000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.498000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56dccd90 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.498000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.498000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.498000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56dccd60 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.498000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff56dccdd0 a2=28 a3=0 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff56dccb80 a2=50 a3=1 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.499000 audit: BPF prog-id=88 op=LOAD Sep 6 00:31:46.499000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff56dccb80 a2=94 a3=5 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.501000 audit: BPF prog-id=88 op=UNLOAD Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff56dccc30 a2=50 a3=1 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff56dccd50 a2=4 a3=38 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.501000 audit[2322]: AVC avc: denied { confidentiality } for pid=2322 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:31:46.501000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff56dccda0 a2=94 a3=6 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.503000 audit[2322]: AVC avc: denied { confidentiality } for pid=2322 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:31:46.503000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff56dcc550 a2=94 a3=88 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.503000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.504000 audit[2322]: AVC avc: denied { confidentiality } for pid=2322 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:31:46.504000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff56dcc550 a2=94 a3=88 items=0 ppid=2234 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.504000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.519000 audit: BPF prog-id=89 op=LOAD Sep 6 00:31:46.519000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5dfb86c0 a2=98 a3=1999999999999999 items=0 ppid=2234 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.519000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:31:46.521000 audit: BPF prog-id=89 op=UNLOAD Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit: BPF prog-id=90 op=LOAD Sep 6 00:31:46.521000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5dfb85a0 a2=94 a3=ffff items=0 ppid=2234 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.521000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:31:46.521000 audit: BPF prog-id=90 op=UNLOAD Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.521000 audit: BPF prog-id=91 op=LOAD Sep 6 00:31:46.521000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5dfb85e0 a2=94 a3=7ffd5dfb87c0 items=0 ppid=2234 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.521000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:31:46.523000 audit: BPF prog-id=91 op=UNLOAD Sep 6 00:31:46.624288 kubelet[1507]: E0906 00:31:46.624195 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:46.717043 systemd-networkd[1029]: vxlan.calico: Link UP Sep 6 00:31:46.717804 systemd-networkd[1029]: vxlan.calico: Gained carrier Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.774000 audit: BPF prog-id=92 op=LOAD Sep 6 00:31:46.774000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0956d560 a2=98 a3=ffff items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.774000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.775000 audit: BPF prog-id=92 op=UNLOAD Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit: BPF prog-id=93 op=LOAD Sep 6 00:31:46.775000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0956d370 a2=94 a3=54428f items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.775000 audit: BPF prog-id=93 op=UNLOAD Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit: BPF prog-id=94 op=LOAD Sep 6 00:31:46.775000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0956d3a0 a2=94 a3=2 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.775000 audit: BPF prog-id=94 op=UNLOAD Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0956d270 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0956d2a0 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0956d1b0 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0956d2c0 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.775000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.775000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0956d2a0 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.775000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0956d290 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0956d2c0 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0956d2a0 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0956d2c0 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0956d290 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0956d300 a2=28 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.776000 audit: BPF prog-id=95 op=LOAD Sep 6 00:31:46.776000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0956d170 a2=94 a3=0 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.776000 audit: BPF prog-id=95 op=UNLOAD Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff0956d160 a2=50 a3=2800 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff0956d160 a2=50 a3=2800 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit: BPF prog-id=96 op=LOAD Sep 6 00:31:46.777000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0956c980 a2=94 a3=2 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.777000 audit: BPF prog-id=96 op=UNLOAD Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.777000 audit: BPF prog-id=97 op=LOAD Sep 6 00:31:46.777000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0956ca80 a2=94 a3=30 items=0 ppid=2234 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.784000 audit: BPF prog-id=98 op=LOAD Sep 6 00:31:46.784000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0fa86250 a2=98 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.784000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.784000 audit: BPF prog-id=98 op=UNLOAD Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit: BPF prog-id=99 op=LOAD Sep 6 00:31:46.785000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0fa86040 a2=94 a3=54428f items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.785000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.785000 audit: BPF prog-id=99 op=UNLOAD Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.785000 audit: BPF prog-id=100 op=LOAD Sep 6 00:31:46.785000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0fa86070 a2=94 a3=2 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.785000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.785000 audit: BPF prog-id=100 op=UNLOAD Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit: BPF prog-id=101 op=LOAD Sep 6 00:31:46.974000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0fa85f30 a2=94 a3=1 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.974000 audit: BPF prog-id=101 op=UNLOAD Sep 6 00:31:46.974000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.974000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0fa86000 a2=50 a3=7fff0fa860e0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0fa85f40 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0fa85f70 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0fa85e80 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0fa85f90 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0fa85f70 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0fa85f60 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0fa85f90 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0fa85f70 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0fa85f90 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0fa85f60 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0fa85fd0 a2=28 a3=0 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0fa85d80 a2=50 a3=1 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.988000 audit: BPF prog-id=102 op=LOAD Sep 6 00:31:46.988000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0fa85d80 a2=94 a3=5 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.989000 audit: BPF prog-id=102 op=UNLOAD Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0fa85e30 a2=50 a3=1 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff0fa85f50 a2=4 a3=38 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { confidentiality } for pid=2365 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:31:46.989000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0fa85fa0 a2=94 a3=6 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { confidentiality } for pid=2365 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:31:46.989000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0fa85750 a2=94 a3=88 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.989000 audit[2365]: AVC avc: denied { confidentiality } for pid=2365 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:31:46.989000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0fa85750 a2=94 a3=88 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.990000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.990000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0fa87180 a2=10 a3=f8f00800 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.990000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.990000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0fa87020 a2=10 a3=3 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.990000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.990000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0fa86fc0 a2=10 a3=3 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:46.990000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:46.990000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0fa86fc0 a2=10 a3=7 items=0 ppid=2234 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:46.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:31:47.012000 audit: BPF prog-id=97 op=UNLOAD Sep 6 00:31:47.012000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=187 a0=18 a1=7ffd8f807860 a2=0 a3=2 items=0 ppid=1016 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:47.012000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 00:31:47.106000 audit[2399]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:31:47.106000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcb11e8160 a2=0 a3=7ffcb11e814c items=0 ppid=2234 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:47.106000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:31:47.122000 audit[2398]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:31:47.122000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdfb594b90 a2=0 a3=7ffdfb594b7c items=0 ppid=2234 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:47.122000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:31:47.128000 audit[2401]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:31:47.128000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcdd39b580 a2=0 a3=7ffcdd39b56c items=0 ppid=2234 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:47.128000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:31:47.141000 audit[2397]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:31:47.141000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffc711f940 a2=0 a3=7fffc711f92c items=0 ppid=2234 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:47.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:31:47.625256 kubelet[1507]: E0906 00:31:47.625147 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:48.625722 kubelet[1507]: E0906 00:31:48.625595 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:48.651869 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Sep 6 00:31:48.897550 env[1196]: time="2025-09-06T00:31:48.896882681Z" level=info msg="StopPodSandbox for \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\"" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.066 [INFO][2420] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.067 [INFO][2420] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" iface="eth0" netns="/var/run/netns/cni-25487e8c-3a4b-6034-efc7-80af34ce7646" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.069 [INFO][2420] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" iface="eth0" netns="/var/run/netns/cni-25487e8c-3a4b-6034-efc7-80af34ce7646" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.070 [INFO][2420] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" iface="eth0" netns="/var/run/netns/cni-25487e8c-3a4b-6034-efc7-80af34ce7646" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.070 [INFO][2420] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.070 [INFO][2420] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.328 [INFO][2427] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.329 [INFO][2427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.329 [INFO][2427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.352 [WARNING][2427] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.352 [INFO][2427] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.355 [INFO][2427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:31:49.359578 env[1196]: 2025-09-06 00:31:49.357 [INFO][2420] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:31:49.364345 systemd[1]: run-netns-cni\x2d25487e8c\x2d3a4b\x2d6034\x2defc7\x2d80af34ce7646.mount: Deactivated successfully. Sep 6 00:31:49.367119 env[1196]: time="2025-09-06T00:31:49.364593995Z" level=info msg="TearDown network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\" successfully" Sep 6 00:31:49.367119 env[1196]: time="2025-09-06T00:31:49.364687059Z" level=info msg="StopPodSandbox for \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\" returns successfully" Sep 6 00:31:49.369542 env[1196]: time="2025-09-06T00:31:49.369485629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-qrdd5,Uid:eba64511-09e2-4ed5-b7cc-ab31e5048cbb,Namespace:default,Attempt:1,}" Sep 6 00:31:49.628362 kubelet[1507]: E0906 00:31:49.626670 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:49.715098 systemd-networkd[1029]: calic74724d4d20: Link UP Sep 6 00:31:49.725855 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:31:49.726111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic74724d4d20: link becomes ready Sep 6 00:31:49.727298 systemd-networkd[1029]: calic74724d4d20: Gained carrier Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.469 [INFO][2434] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0 nginx-deployment-7fcdb87857- default eba64511-09e2-4ed5-b7cc-ab31e5048cbb 1471 0 2025-09-06 00:31:35 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.26.66 nginx-deployment-7fcdb87857-qrdd5 eth0 default [] [] [kns.default ksa.default.default] calic74724d4d20 [] [] }} ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.470 [INFO][2434] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.523 [INFO][2448] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" HandleID="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.524 [INFO][2448] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" HandleID="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.244.26.66", "pod":"nginx-deployment-7fcdb87857-qrdd5", "timestamp":"2025-09-06 00:31:49.523682659 +0000 UTC"}, Hostname:"10.244.26.66", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.524 [INFO][2448] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.524 [INFO][2448] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.524 [INFO][2448] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.26.66' Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.554 [INFO][2448] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.602 [INFO][2448] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.616 [INFO][2448] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.624 [INFO][2448] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.634 [INFO][2448] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.634 [INFO][2448] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.637 [INFO][2448] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.674 [INFO][2448] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.693 [INFO][2448] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.193/26] block=192.168.75.192/26 handle="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.693 [INFO][2448] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.193/26] handle="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" host="10.244.26.66" Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.693 [INFO][2448] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:31:49.773173 env[1196]: 2025-09-06 00:31:49.693 [INFO][2448] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.193/26] IPv6=[] ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" HandleID="k8s-pod-network.a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.774805 env[1196]: 2025-09-06 00:31:49.696 [INFO][2434] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"eba64511-09e2-4ed5-b7cc-ab31e5048cbb", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-qrdd5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic74724d4d20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:31:49.774805 env[1196]: 2025-09-06 00:31:49.697 [INFO][2434] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.193/32] ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.774805 env[1196]: 2025-09-06 00:31:49.697 [INFO][2434] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic74724d4d20 ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.774805 env[1196]: 2025-09-06 00:31:49.731 [INFO][2434] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.774805 env[1196]: 2025-09-06 00:31:49.732 [INFO][2434] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"eba64511-09e2-4ed5-b7cc-ab31e5048cbb", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b", Pod:"nginx-deployment-7fcdb87857-qrdd5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic74724d4d20", MAC:"7e:5f:5f:c2:6f:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:31:49.774805 env[1196]: 2025-09-06 00:31:49.770 [INFO][2434] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b" Namespace="default" Pod="nginx-deployment-7fcdb87857-qrdd5" WorkloadEndpoint="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:31:49.803098 env[1196]: time="2025-09-06T00:31:49.802951039Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:31:49.803437 env[1196]: time="2025-09-06T00:31:49.803108135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:31:49.803437 env[1196]: time="2025-09-06T00:31:49.803193177Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:31:49.805564 env[1196]: time="2025-09-06T00:31:49.803728699Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b pid=2472 runtime=io.containerd.runc.v2 Sep 6 00:31:49.831421 systemd[1]: Started cri-containerd-a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b.scope. Sep 6 00:31:49.821000 audit[2477]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:31:49.821000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7ffc7ba3a5b0 a2=0 a3=7ffc7ba3a59c items=0 ppid=2234 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:49.821000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.877000 audit: BPF prog-id=103 op=LOAD Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2472 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:49.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133396364656437656537613034626662343838306263643638303033 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2472 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:49.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133396364656437656537613034626662343838306263643638303033 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.881000 audit: BPF prog-id=104 op=LOAD Sep 6 00:31:49.881000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ca8d0 items=0 ppid=2472 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:49.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133396364656437656537613034626662343838306263643638303033 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit: BPF prog-id=105 op=LOAD Sep 6 00:31:49.884000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ca918 items=0 ppid=2472 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:49.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133396364656437656537613034626662343838306263643638303033 Sep 6 00:31:49.884000 audit: BPF prog-id=105 op=UNLOAD Sep 6 00:31:49.884000 audit: BPF prog-id=104 op=UNLOAD Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:49.884000 audit: BPF prog-id=106 op=LOAD Sep 6 00:31:49.884000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cad28 items=0 ppid=2472 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:49.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133396364656437656537613034626662343838306263643638303033 Sep 6 00:31:49.933502 env[1196]: time="2025-09-06T00:31:49.933432513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-qrdd5,Uid:eba64511-09e2-4ed5-b7cc-ab31e5048cbb,Namespace:default,Attempt:1,} returns sandbox id \"a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b\"" Sep 6 00:31:49.937888 env[1196]: time="2025-09-06T00:31:49.937807938Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:31:50.365073 systemd[1]: run-containerd-runc-k8s.io-a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b-runc.X4zXiV.mount: Deactivated successfully. Sep 6 00:31:50.627356 kubelet[1507]: E0906 00:31:50.627047 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:51.468375 systemd-networkd[1029]: calic74724d4d20: Gained IPv6LL Sep 6 00:31:51.628912 kubelet[1507]: E0906 00:31:51.628369 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:51.903354 env[1196]: time="2025-09-06T00:31:51.903127017Z" level=info msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\"" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.058 [INFO][2523] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.058 [INFO][2523] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" iface="eth0" netns="/var/run/netns/cni-04d5ee17-153a-3ef9-5820-e48cc2e2821b" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.059 [INFO][2523] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" iface="eth0" netns="/var/run/netns/cni-04d5ee17-153a-3ef9-5820-e48cc2e2821b" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.059 [INFO][2523] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" iface="eth0" netns="/var/run/netns/cni-04d5ee17-153a-3ef9-5820-e48cc2e2821b" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.059 [INFO][2523] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.059 [INFO][2523] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.176 [INFO][2530] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.182 [INFO][2530] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.182 [INFO][2530] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.202 [WARNING][2530] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.202 [INFO][2530] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.206 [INFO][2530] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:31:52.210595 env[1196]: 2025-09-06 00:31:52.208 [INFO][2523] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:31:52.215313 systemd[1]: run-netns-cni\x2d04d5ee17\x2d153a\x2d3ef9\x2d5820\x2de48cc2e2821b.mount: Deactivated successfully. Sep 6 00:31:52.217483 env[1196]: time="2025-09-06T00:31:52.217409895Z" level=info msg="TearDown network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" successfully" Sep 6 00:31:52.217665 env[1196]: time="2025-09-06T00:31:52.217629473Z" level=info msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" returns successfully" Sep 6 00:31:52.220711 env[1196]: time="2025-09-06T00:31:52.219783485Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h86jk,Uid:b516e9d6-9aa7-421d-b567-565416c28334,Namespace:calico-system,Attempt:1,}" Sep 6 00:31:52.524016 systemd-networkd[1029]: cali7148b674d91: Link UP Sep 6 00:31:52.532796 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:31:52.533024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7148b674d91: link becomes ready Sep 6 00:31:52.532411 systemd-networkd[1029]: cali7148b674d91: Gained carrier Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.333 [INFO][2542] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.26.66-k8s-csi--node--driver--h86jk-eth0 csi-node-driver- calico-system b516e9d6-9aa7-421d-b567-565416c28334 1484 0 2025-09-06 00:31:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.244.26.66 csi-node-driver-h86jk eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali7148b674d91 [] [] }} ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.334 [INFO][2542] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.404 [INFO][2556] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" HandleID="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.405 [INFO][2556] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" HandleID="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"calico-system", "node":"10.244.26.66", "pod":"csi-node-driver-h86jk", "timestamp":"2025-09-06 00:31:52.404553113 +0000 UTC"}, Hostname:"10.244.26.66", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.405 [INFO][2556] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.405 [INFO][2556] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.405 [INFO][2556] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.26.66' Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.429 [INFO][2556] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.437 [INFO][2556] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.445 [INFO][2556] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.449 [INFO][2556] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.454 [INFO][2556] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.454 [INFO][2556] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.468 [INFO][2556] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743 Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.477 [INFO][2556] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.492 [INFO][2556] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.194/26] block=192.168.75.192/26 handle="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.492 [INFO][2556] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.194/26] handle="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" host="10.244.26.66" Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.492 [INFO][2556] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:31:52.589015 env[1196]: 2025-09-06 00:31:52.492 [INFO][2556] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.194/26] IPv6=[] ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" HandleID="k8s-pod-network.0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.590619 env[1196]: 2025-09-06 00:31:52.495 [INFO][2542] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-csi--node--driver--h86jk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b516e9d6-9aa7-421d-b567-565416c28334", ResourceVersion:"1484", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"", Pod:"csi-node-driver-h86jk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7148b674d91", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:31:52.590619 env[1196]: 2025-09-06 00:31:52.495 [INFO][2542] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.194/32] ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.590619 env[1196]: 2025-09-06 00:31:52.496 [INFO][2542] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7148b674d91 ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.590619 env[1196]: 2025-09-06 00:31:52.538 [INFO][2542] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.590619 env[1196]: 2025-09-06 00:31:52.545 [INFO][2542] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-csi--node--driver--h86jk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b516e9d6-9aa7-421d-b567-565416c28334", ResourceVersion:"1484", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743", Pod:"csi-node-driver-h86jk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7148b674d91", MAC:"92:06:bb:3b:f8:e0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:31:52.590619 env[1196]: 2025-09-06 00:31:52.569 [INFO][2542] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743" Namespace="calico-system" Pod="csi-node-driver-h86jk" WorkloadEndpoint="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:31:52.611000 audit[2571]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:31:52.620267 kernel: kauditd_printk_skb: 609 callbacks suppressed Sep 6 00:31:52.620405 kernel: audit: type=1325 audit(1757118712.611:682): table=filter:70 family=2 entries=42 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:31:52.611000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7fffd6990b70 a2=0 a3=7fffd6990b5c items=0 ppid=2234 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:52.629177 kubelet[1507]: E0906 00:31:52.629015 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:52.633488 kernel: audit: type=1300 audit(1757118712.611:682): arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7fffd6990b70 a2=0 a3=7fffd6990b5c items=0 ppid=2234 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:52.611000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:31:52.645612 kernel: audit: type=1327 audit(1757118712.611:682): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:31:52.651460 env[1196]: time="2025-09-06T00:31:52.651219911Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:31:52.651460 env[1196]: time="2025-09-06T00:31:52.651358980Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:31:52.651460 env[1196]: time="2025-09-06T00:31:52.651396236Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:31:52.651972 env[1196]: time="2025-09-06T00:31:52.651635699Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743 pid=2578 runtime=io.containerd.runc.v2 Sep 6 00:31:52.693814 systemd[1]: Started cri-containerd-0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743.scope. Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.753766 kernel: audit: type=1400 audit(1757118712.740:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.753959 kernel: audit: type=1400 audit(1757118712.740:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.765579 kernel: audit: type=1400 audit(1757118712.740:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.765762 kernel: audit: type=1400 audit(1757118712.740:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.765831 kernel: audit: type=1400 audit(1757118712.740:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.771221 kernel: audit: type=1400 audit(1757118712.740:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.776423 kernel: audit: type=1400 audit(1757118712.740:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit: BPF prog-id=107 op=LOAD Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2578 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:52.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383033323863646566663564323231393066343134313932303466 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2578 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:52.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383033323863646566663564323231393066343134313932303466 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.754000 audit: BPF prog-id=108 op=LOAD Sep 6 00:31:52.754000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015d320 items=0 ppid=2578 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:52.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383033323863646566663564323231393066343134313932303466 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit: BPF prog-id=109 op=LOAD Sep 6 00:31:52.759000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015d368 items=0 ppid=2578 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:52.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383033323863646566663564323231393066343134313932303466 Sep 6 00:31:52.759000 audit: BPF prog-id=109 op=UNLOAD Sep 6 00:31:52.759000 audit: BPF prog-id=108 op=UNLOAD Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:52.759000 audit: BPF prog-id=110 op=LOAD Sep 6 00:31:52.759000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015d778 items=0 ppid=2578 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:52.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383033323863646566663564323231393066343134313932303466 Sep 6 00:31:52.810263 env[1196]: time="2025-09-06T00:31:52.809914945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h86jk,Uid:b516e9d6-9aa7-421d-b567-565416c28334,Namespace:calico-system,Attempt:1,} returns sandbox id \"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743\"" Sep 6 00:31:53.629561 kubelet[1507]: E0906 00:31:53.629472 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:54.412197 systemd-networkd[1029]: cali7148b674d91: Gained IPv6LL Sep 6 00:31:54.629917 kubelet[1507]: E0906 00:31:54.629838 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:54.954881 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3924957882.mount: Deactivated successfully. Sep 6 00:31:55.630146 kubelet[1507]: E0906 00:31:55.630026 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:56.631329 kubelet[1507]: E0906 00:31:56.631221 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:57.632026 kubelet[1507]: E0906 00:31:57.631884 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:57.713094 env[1196]: time="2025-09-06T00:31:57.712928282Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:57.720359 env[1196]: time="2025-09-06T00:31:57.718301958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:57.725493 env[1196]: time="2025-09-06T00:31:57.725422382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:57.728955 env[1196]: time="2025-09-06T00:31:57.728894782Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:31:57.730901 env[1196]: time="2025-09-06T00:31:57.730855761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:57.732807 env[1196]: time="2025-09-06T00:31:57.732766129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 00:31:57.741754 env[1196]: time="2025-09-06T00:31:57.741659270Z" level=info msg="CreateContainer within sandbox \"a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 6 00:31:57.772559 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1763217206.mount: Deactivated successfully. Sep 6 00:31:57.791589 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2823959200.mount: Deactivated successfully. Sep 6 00:31:57.800936 env[1196]: time="2025-09-06T00:31:57.800763110Z" level=info msg="CreateContainer within sandbox \"a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"cb71740e8241c0021d599eb656bc10a71496b6f1f802adcc941e9a7ff5580346\"" Sep 6 00:31:57.803370 env[1196]: time="2025-09-06T00:31:57.803280358Z" level=info msg="StartContainer for \"cb71740e8241c0021d599eb656bc10a71496b6f1f802adcc941e9a7ff5580346\"" Sep 6 00:31:57.841793 systemd[1]: Started cri-containerd-cb71740e8241c0021d599eb656bc10a71496b6f1f802adcc941e9a7ff5580346.scope. Sep 6 00:31:57.885242 kernel: kauditd_printk_skb: 50 callbacks suppressed Sep 6 00:31:57.885540 kernel: audit: type=1400 audit(1757118717.883:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.895004 kernel: audit: type=1400 audit(1757118717.883:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.895132 kernel: audit: type=1400 audit(1757118717.883:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.899663 kernel: audit: type=1400 audit(1757118717.883:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.909426 kernel: audit: type=1400 audit(1757118717.883:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.909567 kernel: audit: type=1400 audit(1757118717.883:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.919571 kernel: audit: type=1400 audit(1757118717.883:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.919670 kernel: audit: type=1400 audit(1757118717.883:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.929616 kernel: audit: type=1400 audit(1757118717.883:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.936465 kernel: audit: type=1400 audit(1757118717.894:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.894000 audit: BPF prog-id=111 op=LOAD Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2472 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:57.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373137343065383234316330303231643539396562363536626331 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2472 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:57.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373137343065383234316330303231643539396562363536626331 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.896000 audit: BPF prog-id=112 op=LOAD Sep 6 00:31:57.896000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000314b00 items=0 ppid=2472 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:57.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373137343065383234316330303231643539396562363536626331 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.904000 audit: BPF prog-id=113 op=LOAD Sep 6 00:31:57.904000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000314b48 items=0 ppid=2472 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:57.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373137343065383234316330303231643539396562363536626331 Sep 6 00:31:57.914000 audit: BPF prog-id=113 op=UNLOAD Sep 6 00:31:57.914000 audit: BPF prog-id=112 op=UNLOAD Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:57.914000 audit: BPF prog-id=114 op=LOAD Sep 6 00:31:57.914000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000314f58 items=0 ppid=2472 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:57.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373137343065383234316330303231643539396562363536626331 Sep 6 00:31:57.969164 env[1196]: time="2025-09-06T00:31:57.969099723Z" level=info msg="StartContainer for \"cb71740e8241c0021d599eb656bc10a71496b6f1f802adcc941e9a7ff5580346\" returns successfully" Sep 6 00:31:58.632929 kubelet[1507]: E0906 00:31:58.632817 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:59.306645 env[1196]: time="2025-09-06T00:31:59.306547460Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:59.312555 env[1196]: time="2025-09-06T00:31:59.312510854Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:59.314299 env[1196]: time="2025-09-06T00:31:59.314263266Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:59.316217 env[1196]: time="2025-09-06T00:31:59.316174400Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:31:59.317169 env[1196]: time="2025-09-06T00:31:59.317118957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 00:31:59.322594 env[1196]: time="2025-09-06T00:31:59.322551651Z" level=info msg="CreateContainer within sandbox \"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 00:31:59.343525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1870054580.mount: Deactivated successfully. Sep 6 00:31:59.347915 env[1196]: time="2025-09-06T00:31:59.347854863Z" level=info msg="CreateContainer within sandbox \"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"fe6114a9bd5c01f590088129538b372645e9901cd1da78a8751eafdaf6dd9918\"" Sep 6 00:31:59.349538 env[1196]: time="2025-09-06T00:31:59.349498181Z" level=info msg="StartContainer for \"fe6114a9bd5c01f590088129538b372645e9901cd1da78a8751eafdaf6dd9918\"" Sep 6 00:31:59.387056 systemd[1]: Started cri-containerd-fe6114a9bd5c01f590088129538b372645e9901cd1da78a8751eafdaf6dd9918.scope. Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fa8ad42fa08 items=0 ppid=2578 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:59.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363131346139626435633031663539303038383132393533386233 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit: BPF prog-id=115 op=LOAD Sep 6 00:31:59.417000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0003b0498 items=0 ppid=2578 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:59.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363131346139626435633031663539303038383132393533386233 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.417000 audit: BPF prog-id=116 op=LOAD Sep 6 00:31:59.417000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0003b04e8 items=0 ppid=2578 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:59.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363131346139626435633031663539303038383132393533386233 Sep 6 00:31:59.418000 audit: BPF prog-id=116 op=UNLOAD Sep 6 00:31:59.418000 audit: BPF prog-id=115 op=UNLOAD Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:31:59.418000 audit: BPF prog-id=117 op=LOAD Sep 6 00:31:59.418000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0003b0578 items=0 ppid=2578 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:59.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363131346139626435633031663539303038383132393533386233 Sep 6 00:31:59.448472 env[1196]: time="2025-09-06T00:31:59.448406820Z" level=info msg="StartContainer for \"fe6114a9bd5c01f590088129538b372645e9901cd1da78a8751eafdaf6dd9918\" returns successfully" Sep 6 00:31:59.450966 env[1196]: time="2025-09-06T00:31:59.450928623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 00:31:59.634720 kubelet[1507]: E0906 00:31:59.634644 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:31:59.765278 systemd[1]: run-containerd-runc-k8s.io-fe6114a9bd5c01f590088129538b372645e9901cd1da78a8751eafdaf6dd9918-runc.3O5tOV.mount: Deactivated successfully. Sep 6 00:32:00.635553 kubelet[1507]: E0906 00:32:00.635457 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:01.447775 env[1196]: time="2025-09-06T00:32:01.447700146Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:01.452055 env[1196]: time="2025-09-06T00:32:01.451989086Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:01.454256 env[1196]: time="2025-09-06T00:32:01.454201549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:01.456434 env[1196]: time="2025-09-06T00:32:01.456372537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:01.457340 env[1196]: time="2025-09-06T00:32:01.457299155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 00:32:01.467079 env[1196]: time="2025-09-06T00:32:01.467017021Z" level=info msg="CreateContainer within sandbox \"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 00:32:01.491409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2919287875.mount: Deactivated successfully. Sep 6 00:32:01.497601 env[1196]: time="2025-09-06T00:32:01.497534195Z" level=info msg="CreateContainer within sandbox \"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4c9ebeb535cc95424436f0a465d1cadedb786b475438f6ad91de3fa0fcb60392\"" Sep 6 00:32:01.502995 env[1196]: time="2025-09-06T00:32:01.502910884Z" level=info msg="StartContainer for \"4c9ebeb535cc95424436f0a465d1cadedb786b475438f6ad91de3fa0fcb60392\"" Sep 6 00:32:01.566080 systemd[1]: Started cri-containerd-4c9ebeb535cc95424436f0a465d1cadedb786b475438f6ad91de3fa0fcb60392.scope. Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fae1eaa6e68 items=0 ppid=2578 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:01.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396562656235333563633935343234343336663061343635643163 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.590000 audit: BPF prog-id=118 op=LOAD Sep 6 00:32:01.590000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002fc678 items=0 ppid=2578 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:01.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396562656235333563633935343234343336663061343635643163 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit: BPF prog-id=119 op=LOAD Sep 6 00:32:01.593000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002fc6c8 items=0 ppid=2578 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:01.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396562656235333563633935343234343336663061343635643163 Sep 6 00:32:01.593000 audit: BPF prog-id=119 op=UNLOAD Sep 6 00:32:01.593000 audit: BPF prog-id=118 op=UNLOAD Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:01.593000 audit: BPF prog-id=120 op=LOAD Sep 6 00:32:01.593000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002fc758 items=0 ppid=2578 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:01.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463396562656235333563633935343234343336663061343635643163 Sep 6 00:32:01.637675 kubelet[1507]: E0906 00:32:01.637590 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:01.651812 env[1196]: time="2025-09-06T00:32:01.651726486Z" level=info msg="StartContainer for \"4c9ebeb535cc95424436f0a465d1cadedb786b475438f6ad91de3fa0fcb60392\" returns successfully" Sep 6 00:32:01.829005 kubelet[1507]: I0906 00:32:01.828800 1507 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 00:32:01.831495 kubelet[1507]: I0906 00:32:01.831459 1507 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 00:32:02.317685 kubelet[1507]: I0906 00:32:02.317519 1507 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-h86jk" podStartSLOduration=50.670849083 podStartE2EDuration="59.317440479s" podCreationTimestamp="2025-09-06 00:31:03 +0000 UTC" firstStartedPulling="2025-09-06 00:31:52.81259923 +0000 UTC m=+51.269358968" lastFinishedPulling="2025-09-06 00:32:01.45919062 +0000 UTC m=+59.915950364" observedRunningTime="2025-09-06 00:32:02.315112159 +0000 UTC m=+60.771871903" watchObservedRunningTime="2025-09-06 00:32:02.317440479 +0000 UTC m=+60.774200228" Sep 6 00:32:02.318093 kubelet[1507]: I0906 00:32:02.317928 1507 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-qrdd5" podStartSLOduration=19.523006451 podStartE2EDuration="27.317916508s" podCreationTimestamp="2025-09-06 00:31:35 +0000 UTC" firstStartedPulling="2025-09-06 00:31:49.936542091 +0000 UTC m=+48.393301824" lastFinishedPulling="2025-09-06 00:31:57.731452134 +0000 UTC m=+56.188211881" observedRunningTime="2025-09-06 00:31:58.297682289 +0000 UTC m=+56.754442024" watchObservedRunningTime="2025-09-06 00:32:02.317916508 +0000 UTC m=+60.774676247" Sep 6 00:32:02.568861 kubelet[1507]: E0906 00:32:02.568553 1507 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:02.641292 kubelet[1507]: E0906 00:32:02.640478 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:02.690765 env[1196]: time="2025-09-06T00:32:02.690691994Z" level=info msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\"" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.873 [WARNING][2758] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-csi--node--driver--h86jk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b516e9d6-9aa7-421d-b567-565416c28334", ResourceVersion:"1523", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743", Pod:"csi-node-driver-h86jk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7148b674d91", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.874 [INFO][2758] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.874 [INFO][2758] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" iface="eth0" netns="" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.874 [INFO][2758] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.874 [INFO][2758] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.963 [INFO][2766] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.969 [INFO][2766] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.969 [INFO][2766] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.988 [WARNING][2766] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.988 [INFO][2766] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.991 [INFO][2766] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:32:02.994351 env[1196]: 2025-09-06 00:32:02.992 [INFO][2758] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:02.998519 env[1196]: time="2025-09-06T00:32:02.998009473Z" level=info msg="TearDown network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" successfully" Sep 6 00:32:02.998519 env[1196]: time="2025-09-06T00:32:02.998067504Z" level=info msg="StopPodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" returns successfully" Sep 6 00:32:02.999238 env[1196]: time="2025-09-06T00:32:02.999151844Z" level=info msg="RemovePodSandbox for \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\"" Sep 6 00:32:02.999344 env[1196]: time="2025-09-06T00:32:02.999208373Z" level=info msg="Forcibly stopping sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\"" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.090 [WARNING][2783] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-csi--node--driver--h86jk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b516e9d6-9aa7-421d-b567-565416c28334", ResourceVersion:"1523", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"0980328cdeff5d22190f41419204fdeaa7815e327f121c8c78c9ad6db97d0743", Pod:"csi-node-driver-h86jk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7148b674d91", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.100 [INFO][2783] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.100 [INFO][2783] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" iface="eth0" netns="" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.100 [INFO][2783] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.100 [INFO][2783] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.152 [INFO][2790] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.153 [INFO][2790] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.153 [INFO][2790] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.172 [WARNING][2790] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.172 [INFO][2790] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" HandleID="k8s-pod-network.2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Workload="10.244.26.66-k8s-csi--node--driver--h86jk-eth0" Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.176 [INFO][2790] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:32:03.181013 env[1196]: 2025-09-06 00:32:03.178 [INFO][2783] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159" Sep 6 00:32:03.182500 env[1196]: time="2025-09-06T00:32:03.182412150Z" level=info msg="TearDown network for sandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" successfully" Sep 6 00:32:03.189055 env[1196]: time="2025-09-06T00:32:03.188979806Z" level=info msg="RemovePodSandbox \"2817888d86e0377bcadde32a4d6ca6cc080ffb4c55b791d491078dddc0665159\" returns successfully" Sep 6 00:32:03.196007 env[1196]: time="2025-09-06T00:32:03.195921000Z" level=info msg="StopPodSandbox for \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\"" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.274 [WARNING][2806] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"eba64511-09e2-4ed5-b7cc-ab31e5048cbb", ResourceVersion:"1503", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b", Pod:"nginx-deployment-7fcdb87857-qrdd5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic74724d4d20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.275 [INFO][2806] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.275 [INFO][2806] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" iface="eth0" netns="" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.275 [INFO][2806] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.275 [INFO][2806] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.310 [INFO][2813] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.310 [INFO][2813] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.310 [INFO][2813] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.331 [WARNING][2813] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.331 [INFO][2813] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.336 [INFO][2813] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:32:03.339793 env[1196]: 2025-09-06 00:32:03.338 [INFO][2806] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.340912 env[1196]: time="2025-09-06T00:32:03.340471398Z" level=info msg="TearDown network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\" successfully" Sep 6 00:32:03.340912 env[1196]: time="2025-09-06T00:32:03.340525305Z" level=info msg="StopPodSandbox for \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\" returns successfully" Sep 6 00:32:03.342012 env[1196]: time="2025-09-06T00:32:03.341304925Z" level=info msg="RemovePodSandbox for \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\"" Sep 6 00:32:03.342012 env[1196]: time="2025-09-06T00:32:03.341356493Z" level=info msg="Forcibly stopping sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\"" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.431 [WARNING][2828] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"eba64511-09e2-4ed5-b7cc-ab31e5048cbb", ResourceVersion:"1503", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 31, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"a39cded7ee7a04bfb4880bcd68003f2fc4cab67993cb6a4be2d8c31f9c1f454b", Pod:"nginx-deployment-7fcdb87857-qrdd5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic74724d4d20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.432 [INFO][2828] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.432 [INFO][2828] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" iface="eth0" netns="" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.432 [INFO][2828] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.432 [INFO][2828] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.467 [INFO][2835] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.467 [INFO][2835] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.467 [INFO][2835] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.499 [WARNING][2835] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.499 [INFO][2835] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" HandleID="k8s-pod-network.e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Workload="10.244.26.66-k8s-nginx--deployment--7fcdb87857--qrdd5-eth0" Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.505 [INFO][2835] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:32:03.507829 env[1196]: 2025-09-06 00:32:03.506 [INFO][2828] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1" Sep 6 00:32:03.508855 env[1196]: time="2025-09-06T00:32:03.508801827Z" level=info msg="TearDown network for sandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\" successfully" Sep 6 00:32:03.512761 env[1196]: time="2025-09-06T00:32:03.512707694Z" level=info msg="RemovePodSandbox \"e177005e1fe8714c9f5e48740e53d3cbda99cc25b4a00f2167865015df62d3b1\" returns successfully" Sep 6 00:32:03.643246 kubelet[1507]: E0906 00:32:03.641366 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:04.642851 kubelet[1507]: E0906 00:32:04.642753 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:05.643794 kubelet[1507]: E0906 00:32:05.643653 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:06.644717 kubelet[1507]: E0906 00:32:06.644550 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:07.645473 kubelet[1507]: E0906 00:32:07.645364 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:08.645995 kubelet[1507]: E0906 00:32:08.645940 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:09.648072 kubelet[1507]: E0906 00:32:09.647979 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:10.186000 audit[2848]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.194166 kernel: kauditd_printk_skb: 133 callbacks suppressed Sep 6 00:32:10.194452 kernel: audit: type=1325 audit(1757118730.186:731): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.186000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe8fc83980 a2=0 a3=7ffe8fc8396c items=0 ppid=1781 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.213136 kernel: audit: type=1300 audit(1757118730.186:731): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe8fc83980 a2=0 a3=7ffe8fc8396c items=0 ppid=1781 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.213353 kernel: audit: type=1327 audit(1757118730.186:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.212000 audit[2848]: NETFILTER_CFG table=nat:72 family=2 entries=26 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.212000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe8fc83980 a2=0 a3=0 items=0 ppid=1781 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.226751 kernel: audit: type=1325 audit(1757118730.212:732): table=nat:72 family=2 entries=26 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.226985 kernel: audit: type=1300 audit(1757118730.212:732): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe8fc83980 a2=0 a3=0 items=0 ppid=1781 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.227264 kernel: audit: type=1327 audit(1757118730.212:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.397000 audit[2852]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.397000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcb46e9490 a2=0 a3=7ffcb46e947c items=0 ppid=1781 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.411800 kernel: audit: type=1325 audit(1757118730.397:733): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.412006 kernel: audit: type=1300 audit(1757118730.397:733): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcb46e9490 a2=0 a3=7ffcb46e947c items=0 ppid=1781 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.412082 kernel: audit: type=1327 audit(1757118730.397:733): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.416000 audit[2852]: NETFILTER_CFG table=nat:74 family=2 entries=26 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.416000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffcb46e9490 a2=0 a3=0 items=0 ppid=1781 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.425369 kernel: audit: type=1325 audit(1757118730.416:734): table=nat:74 family=2 entries=26 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.648880 kubelet[1507]: E0906 00:32:10.648803 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:11.003889 systemd[1]: Created slice kubepods-besteffort-pod8b9a2a4c_bb58_4b22_a307_0eecc486ace7.slice. Sep 6 00:32:11.044702 kubelet[1507]: I0906 00:32:11.044639 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rffv7\" (UniqueName: \"kubernetes.io/projected/8b9a2a4c-bb58-4b22-a307-0eecc486ace7-kube-api-access-rffv7\") pod \"nfs-server-provisioner-0\" (UID: \"8b9a2a4c-bb58-4b22-a307-0eecc486ace7\") " pod="default/nfs-server-provisioner-0" Sep 6 00:32:11.045086 kubelet[1507]: I0906 00:32:11.045054 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/8b9a2a4c-bb58-4b22-a307-0eecc486ace7-data\") pod \"nfs-server-provisioner-0\" (UID: \"8b9a2a4c-bb58-4b22-a307-0eecc486ace7\") " pod="default/nfs-server-provisioner-0" Sep 6 00:32:11.311733 env[1196]: time="2025-09-06T00:32:11.311632711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8b9a2a4c-bb58-4b22-a307-0eecc486ace7,Namespace:default,Attempt:0,}" Sep 6 00:32:11.650239 kubelet[1507]: E0906 00:32:11.649601 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:12.171136 systemd-networkd[1029]: cali60e51b789ff: Link UP Sep 6 00:32:12.179780 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:32:12.180205 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 6 00:32:12.180185 systemd-networkd[1029]: cali60e51b789ff: Gained carrier Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.601 [INFO][2854] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.26.66-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 8b9a2a4c-bb58-4b22-a307-0eecc486ace7 1561 0 2025-09-06 00:32:10 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.244.26.66 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.601 [INFO][2854] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.736 [INFO][2867] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" HandleID="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Workload="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.737 [INFO][2867] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" HandleID="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Workload="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad490), Attrs:map[string]string{"namespace":"default", "node":"10.244.26.66", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-06 00:32:11.736935049 +0000 UTC"}, Hostname:"10.244.26.66", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.737 [INFO][2867] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.737 [INFO][2867] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.737 [INFO][2867] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.26.66' Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.882 [INFO][2867] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:11.974 [INFO][2867] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.040 [INFO][2867] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.060 [INFO][2867] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.068 [INFO][2867] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.068 [INFO][2867] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.112 [INFO][2867] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366 Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.125 [INFO][2867] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.160 [INFO][2867] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.195/26] block=192.168.75.192/26 handle="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.160 [INFO][2867] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.195/26] handle="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" host="10.244.26.66" Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.160 [INFO][2867] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:32:12.292838 env[1196]: 2025-09-06 00:32:12.160 [INFO][2867] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.195/26] IPv6=[] ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" HandleID="k8s-pod-network.38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Workload="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:32:12.294672 env[1196]: 2025-09-06 00:32:12.163 [INFO][2854] cni-plugin/k8s.go 418: Populated endpoint ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8b9a2a4c-bb58-4b22-a307-0eecc486ace7", ResourceVersion:"1561", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 32, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:12.294672 env[1196]: 2025-09-06 00:32:12.163 [INFO][2854] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.195/32] ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:32:12.294672 env[1196]: 2025-09-06 00:32:12.163 [INFO][2854] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:32:12.294672 env[1196]: 2025-09-06 00:32:12.184 [INFO][2854] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:32:12.295230 env[1196]: 2025-09-06 00:32:12.185 [INFO][2854] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8b9a2a4c-bb58-4b22-a307-0eecc486ace7", ResourceVersion:"1561", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 32, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8a:fb:44:75:ba:42", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:12.295230 env[1196]: 2025-09-06 00:32:12.290 [INFO][2854] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.26.66-k8s-nfs--server--provisioner--0-eth0" Sep 6 00:32:12.312693 env[1196]: time="2025-09-06T00:32:12.312541102Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:32:12.313542 env[1196]: time="2025-09-06T00:32:12.312651551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:32:12.313542 env[1196]: time="2025-09-06T00:32:12.312671085Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:32:12.313542 env[1196]: time="2025-09-06T00:32:12.313126199Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366 pid=2888 runtime=io.containerd.runc.v2 Sep 6 00:32:12.354647 systemd[1]: Started cri-containerd-38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366.scope. Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.378000 audit: BPF prog-id=121 op=LOAD Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2888 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:12.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338626232643737306263343831333466326137636332376439373166 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2888 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:12.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338626232643737306263343831333466326137636332376439373166 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit: BPF prog-id=122 op=LOAD Sep 6 00:32:12.379000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038a3c0 items=0 ppid=2888 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:12.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338626232643737306263343831333466326137636332376439373166 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.379000 audit: BPF prog-id=123 op=LOAD Sep 6 00:32:12.379000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038a408 items=0 ppid=2888 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:12.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338626232643737306263343831333466326137636332376439373166 Sep 6 00:32:12.379000 audit: BPF prog-id=123 op=UNLOAD Sep 6 00:32:12.380000 audit: BPF prog-id=122 op=UNLOAD Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:12.380000 audit: BPF prog-id=124 op=LOAD Sep 6 00:32:12.380000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038a818 items=0 ppid=2888 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:12.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338626232643737306263343831333466326137636332376439373166 Sep 6 00:32:12.426232 env[1196]: time="2025-09-06T00:32:12.426035606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8b9a2a4c-bb58-4b22-a307-0eecc486ace7,Namespace:default,Attempt:0,} returns sandbox id \"38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366\"" Sep 6 00:32:12.431150 env[1196]: time="2025-09-06T00:32:12.431087874Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 6 00:32:12.548000 audit[2923]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:32:12.548000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffc65d8c5c0 a2=0 a3=7ffc65d8c5ac items=0 ppid=2234 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:12.548000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:32:12.616260 sshd[2102]: Connection reset by 64.226.104.126 port 6103 [preauth] Sep 6 00:32:12.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.26.66:22-64.226.104.126:6103 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:12.617171 systemd[1]: sshd@9-10.244.26.66:22-64.226.104.126:6103.service: Deactivated successfully. Sep 6 00:32:12.650674 kubelet[1507]: E0906 00:32:12.650608 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:13.450010 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL Sep 6 00:32:13.651662 kubelet[1507]: E0906 00:32:13.651526 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:14.652188 kubelet[1507]: E0906 00:32:14.652033 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:15.652726 kubelet[1507]: E0906 00:32:15.652626 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:16.653497 kubelet[1507]: E0906 00:32:16.653362 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:17.654445 kubelet[1507]: E0906 00:32:17.654275 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:18.655635 kubelet[1507]: E0906 00:32:18.655511 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:19.664547 kubelet[1507]: E0906 00:32:19.656636 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:20.603894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2897759885.mount: Deactivated successfully. Sep 6 00:32:20.657871 kubelet[1507]: E0906 00:32:20.657790 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:21.659087 kubelet[1507]: E0906 00:32:21.658996 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:22.568265 kubelet[1507]: E0906 00:32:22.568199 1507 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:22.660585 kubelet[1507]: E0906 00:32:22.660476 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:23.663276 kubelet[1507]: E0906 00:32:23.663117 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:24.419773 env[1196]: time="2025-09-06T00:32:24.419579800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:24.423377 env[1196]: time="2025-09-06T00:32:24.423312964Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:24.426043 env[1196]: time="2025-09-06T00:32:24.426003133Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:24.428494 env[1196]: time="2025-09-06T00:32:24.428355760Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:24.429625 env[1196]: time="2025-09-06T00:32:24.429558438Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 6 00:32:24.438442 env[1196]: time="2025-09-06T00:32:24.438295579Z" level=info msg="CreateContainer within sandbox \"38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 6 00:32:24.458109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount543452948.mount: Deactivated successfully. Sep 6 00:32:24.471155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount354115987.mount: Deactivated successfully. Sep 6 00:32:24.474584 env[1196]: time="2025-09-06T00:32:24.474484819Z" level=info msg="CreateContainer within sandbox \"38bb2d770bc48134f2a7cc27d971f899a3eda4e26eabeef6d97de4673c7d2366\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"2a86a3f9e4701970c03ba4b6562bc72bca057c5e9b466f5aa0e8f2c7269951db\"" Sep 6 00:32:24.477652 env[1196]: time="2025-09-06T00:32:24.477611810Z" level=info msg="StartContainer for \"2a86a3f9e4701970c03ba4b6562bc72bca057c5e9b466f5aa0e8f2c7269951db\"" Sep 6 00:32:24.521425 systemd[1]: Started cri-containerd-2a86a3f9e4701970c03ba4b6562bc72bca057c5e9b466f5aa0e8f2c7269951db.scope. Sep 6 00:32:24.565623 kernel: kauditd_printk_skb: 63 callbacks suppressed Sep 6 00:32:24.566018 kernel: audit: type=1400 audit(1757118744.559:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.576676 kernel: audit: type=1400 audit(1757118744.559:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.582482 kernel: audit: type=1400 audit(1757118744.560:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.589150 kernel: audit: type=1400 audit(1757118744.560:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.589439 kernel: audit: type=1400 audit(1757118744.560:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.600788 kernel: audit: type=1400 audit(1757118744.560:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.610477 kernel: audit: type=1400 audit(1757118744.560:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.622918 kernel: audit: type=1400 audit(1757118744.560:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.623178 kernel: audit: type=1400 audit(1757118744.560:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.630484 kernel: audit: type=1400 audit(1757118744.569:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.569000 audit: BPF prog-id=125 op=LOAD Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2888 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:24.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383661336639653437303139373063303362613462363536326263 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2888 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:24.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383661336639653437303139373063303362613462363536326263 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.570000 audit: BPF prog-id=126 op=LOAD Sep 6 00:32:24.570000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002035b0 items=0 ppid=2888 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:24.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383661336639653437303139373063303362613462363536326263 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit: BPF prog-id=127 op=LOAD Sep 6 00:32:24.575000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002035f8 items=0 ppid=2888 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:24.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383661336639653437303139373063303362613462363536326263 Sep 6 00:32:24.575000 audit: BPF prog-id=127 op=UNLOAD Sep 6 00:32:24.575000 audit: BPF prog-id=126 op=UNLOAD Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { perfmon } for pid=2958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit[2958]: AVC avc: denied { bpf } for pid=2958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:24.575000 audit: BPF prog-id=128 op=LOAD Sep 6 00:32:24.575000 audit[2958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000203a08 items=0 ppid=2888 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:24.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383661336639653437303139373063303362613462363536326263 Sep 6 00:32:24.664787 kubelet[1507]: E0906 00:32:24.664620 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:24.686125 env[1196]: time="2025-09-06T00:32:24.685850155Z" level=info msg="StartContainer for \"2a86a3f9e4701970c03ba4b6562bc72bca057c5e9b466f5aa0e8f2c7269951db\" returns successfully" Sep 6 00:32:24.742000 audit[2986]: AVC avc: denied { search } for pid=2986 comm="rpcbind" name="crypto" dev="proc" ino=25011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:32:24.742000 audit[2986]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbbcc0160c0 a2=0 a3=0 items=0 ppid=2967 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 key=(null) Sep 6 00:32:24.742000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 6 00:32:24.798000 audit[2991]: AVC avc: denied { search } for pid=2991 comm="dbus-daemon" name="crypto" dev="proc" ino=25011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:32:24.798000 audit[2991]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f089037e0c0 a2=0 a3=0 items=0 ppid=2967 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 key=(null) Sep 6 00:32:24.798000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:32:24.805000 audit[2992]: AVC avc: denied { watch } for pid=2992 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=1050723 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c15,c916 tclass=dir permissive=0 Sep 6 00:32:24.805000 audit[2992]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55d03ff9f530 a2=2c8 a3=7ffff70f35ec items=0 ppid=2967 pid=2992 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 key=(null) Sep 6 00:32:24.805000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 00:32:24.811000 audit[2993]: AVC avc: denied { read } for pid=2993 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 6 00:32:24.811000 audit[2993]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fcd57848320 a1=80000 a2=d a3=7ffc744d0a10 items=0 ppid=2967 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 key=(null) Sep 6 00:32:24.811000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:32:24.815000 audit[2993]: AVC avc: denied { search } for pid=2993 comm="ganesha.nfsd" name="crypto" dev="proc" ino=25011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:32:24.815000 audit[2993]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fcd56d9c0c0 a2=0 a3=0 items=0 ppid=2967 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c916 key=(null) Sep 6 00:32:24.815000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 00:32:25.665412 kubelet[1507]: E0906 00:32:25.665306 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:25.870000 audit[3011]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:25.870000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd4efaeeb0 a2=0 a3=7ffd4efaee9c items=0 ppid=1781 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:25.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:25.879000 audit[3011]: NETFILTER_CFG table=nat:77 family=2 entries=110 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:25.879000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffd4efaeeb0 a2=0 a3=7ffd4efaee9c items=0 ppid=1781 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:25.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:26.667408 kubelet[1507]: E0906 00:32:26.667254 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:27.667662 kubelet[1507]: E0906 00:32:27.667577 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:28.669001 kubelet[1507]: E0906 00:32:28.668897 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:29.670127 kubelet[1507]: E0906 00:32:29.670044 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:30.212849 kubelet[1507]: I0906 00:32:30.212705 1507 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=8.209840576 podStartE2EDuration="20.212645576s" podCreationTimestamp="2025-09-06 00:32:10 +0000 UTC" firstStartedPulling="2025-09-06 00:32:12.429657338 +0000 UTC m=+70.886417073" lastFinishedPulling="2025-09-06 00:32:24.432462338 +0000 UTC m=+82.889222073" observedRunningTime="2025-09-06 00:32:25.475793108 +0000 UTC m=+83.932552876" watchObservedRunningTime="2025-09-06 00:32:30.212645576 +0000 UTC m=+88.669405316" Sep 6 00:32:30.227593 systemd[1]: Created slice kubepods-besteffort-poda3a0b817_6154_4d63_9780_a6715353f2ea.slice. Sep 6 00:32:30.316406 kubelet[1507]: I0906 00:32:30.316295 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-1780a9c8-2a4d-424b-ad03-43dbe28502a9\" (UniqueName: \"kubernetes.io/nfs/a3a0b817-6154-4d63-9780-a6715353f2ea-pvc-1780a9c8-2a4d-424b-ad03-43dbe28502a9\") pod \"test-pod-1\" (UID: \"a3a0b817-6154-4d63-9780-a6715353f2ea\") " pod="default/test-pod-1" Sep 6 00:32:30.316809 kubelet[1507]: I0906 00:32:30.316776 1507 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gvtwl\" (UniqueName: \"kubernetes.io/projected/a3a0b817-6154-4d63-9780-a6715353f2ea-kube-api-access-gvtwl\") pod \"test-pod-1\" (UID: \"a3a0b817-6154-4d63-9780-a6715353f2ea\") " pod="default/test-pod-1" Sep 6 00:32:30.454000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.468254 kernel: Failed to create system directory netfs Sep 6 00:32:30.468518 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 00:32:30.468586 kernel: audit: type=1400 audit(1757118750.454:780): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.468654 kernel: Failed to create system directory netfs Sep 6 00:32:30.468700 kernel: audit: type=1400 audit(1757118750.454:780): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.454000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.476645 kernel: Failed to create system directory netfs Sep 6 00:32:30.476736 kernel: audit: type=1400 audit(1757118750.454:780): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.454000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.483663 kernel: Failed to create system directory netfs Sep 6 00:32:30.483760 kernel: audit: type=1400 audit(1757118750.454:780): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.454000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.454000 audit[3021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56147c08d5e0 a1=153bc a2=56144a4862b0 a3=5 items=0 ppid=74 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:30.502414 kernel: audit: type=1300 audit(1757118750.454:780): arch=c000003e syscall=175 success=yes exit=0 a0=56147c08d5e0 a1=153bc a2=56144a4862b0 a3=5 items=0 ppid=74 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:30.454000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:32:30.508509 kernel: audit: type=1327 audit(1757118750.454:780): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:32:30.518710 kernel: Failed to create system directory fscache Sep 6 00:32:30.518896 kernel: audit: type=1400 audit(1757118750.506:781): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.518954 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.525691 kernel: audit: type=1400 audit(1757118750.506:781): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.525788 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.532783 kernel: audit: type=1400 audit(1757118750.506:781): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.532916 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.553194 kernel: audit: type=1400 audit(1757118750.506:781): avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.553411 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.555937 kernel: Failed to create system directory fscache Sep 6 00:32:30.556034 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.557359 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.558766 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.561744 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.574137 kernel: Failed to create system directory fscache Sep 6 00:32:30.574203 kernel: Failed to create system directory fscache Sep 6 00:32:30.574261 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.506000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.576658 kernel: Failed to create system directory fscache Sep 6 00:32:30.506000 audit[3021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56147c2a29c0 a1=4c0fc a2=56144a4862b0 a3=5 items=0 ppid=74 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:30.579466 kernel: FS-Cache: Loaded Sep 6 00:32:30.506000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.631817 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.631932 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.631995 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.634553 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.634663 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.637336 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.637450 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.640101 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.640193 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.642855 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.642926 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.645568 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.645650 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.648320 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.648454 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.651068 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.651147 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.653911 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.653989 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.656669 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.656734 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.659423 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.659537 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.662172 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.662260 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.664924 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.665015 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.667665 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.667756 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.670059 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.670608 kubelet[1507]: E0906 00:32:30.670425 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:30.671809 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.671906 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.673264 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.676033 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.676127 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.678807 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.678899 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.681567 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.681704 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.684322 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.684435 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.687090 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.687189 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.689864 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.689946 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.692609 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.692707 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.695401 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.695481 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.698101 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.698183 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.700850 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.700942 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.703713 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.703823 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.706496 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.706608 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.709429 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.709572 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.712290 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.712489 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.715171 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.715292 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.718013 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.718166 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.720910 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.722450 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.732620 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.732763 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.732817 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.735148 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.735255 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.737915 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.738021 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.740762 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.740867 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.743458 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.743549 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.746180 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.746318 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.748943 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.749056 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.751688 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.751792 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.754509 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.754624 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.757274 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.757466 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.759972 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.760083 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.761283 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.764176 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.764275 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.765491 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.766924 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.768276 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.769638 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.770989 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.772426 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.773709 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.775165 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.776503 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.778457 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.781066 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.781212 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.782311 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.783757 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.785112 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.786473 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.789212 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.789750 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.790510 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.791921 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.793300 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.794575 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.796016 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.797400 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.798653 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.800092 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.801416 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.802883 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.804174 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.805540 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.806990 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.808301 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.809699 kernel: Failed to create system directory sunrpc Sep 6 00:32:30.609000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.823224 kernel: RPC: Registered named UNIX socket transport module. Sep 6 00:32:30.823523 kernel: RPC: Registered udp transport module. Sep 6 00:32:30.823601 kernel: RPC: Registered tcp transport module. Sep 6 00:32:30.824622 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 6 00:32:30.609000 audit[3021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56147c2eead0 a1=1a81bc a2=56144a4862b0 a3=5 items=6 ppid=74 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:30.609000 audit: CWD cwd="/" Sep 6 00:32:30.609000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:32:30.609000 audit: PATH item=1 name=(null) inode=26039 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:32:30.609000 audit: PATH item=2 name=(null) inode=26039 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:32:30.609000 audit: PATH item=3 name=(null) inode=26040 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:32:30.609000 audit: PATH item=4 name=(null) inode=26039 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:32:30.609000 audit: PATH item=5 name=(null) inode=26041 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:32:30.609000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:32:30.887579 kernel: Failed to create system directory nfs Sep 6 00:32:30.887908 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.890128 kernel: Failed to create system directory nfs Sep 6 00:32:30.890280 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.891435 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.892649 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.898099 kernel: Failed to create system directory nfs Sep 6 00:32:30.898209 kernel: Failed to create system directory nfs Sep 6 00:32:30.898302 kernel: Failed to create system directory nfs Sep 6 00:32:30.898440 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.900816 kernel: Failed to create system directory nfs Sep 6 00:32:30.900952 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.903449 kernel: Failed to create system directory nfs Sep 6 00:32:30.903551 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.906095 kernel: Failed to create system directory nfs Sep 6 00:32:30.906298 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.908678 kernel: Failed to create system directory nfs Sep 6 00:32:30.908769 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.910046 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.912667 kernel: Failed to create system directory nfs Sep 6 00:32:30.912782 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.915331 kernel: Failed to create system directory nfs Sep 6 00:32:30.915575 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.917938 kernel: Failed to create system directory nfs Sep 6 00:32:30.918052 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.920563 kernel: Failed to create system directory nfs Sep 6 00:32:30.920674 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.923203 kernel: Failed to create system directory nfs Sep 6 00:32:30.923274 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.924536 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.925854 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.927177 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.928464 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.931112 kernel: Failed to create system directory nfs Sep 6 00:32:30.931228 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.932433 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.947226 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.948485 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.951110 kernel: Failed to create system directory nfs Sep 6 00:32:30.951246 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.953700 kernel: Failed to create system directory nfs Sep 6 00:32:30.953884 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.955026 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.956327 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.957541 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.958926 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.960210 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.962844 kernel: Failed to create system directory nfs Sep 6 00:32:30.962961 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.965495 kernel: Failed to create system directory nfs Sep 6 00:32:30.965625 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.968127 kernel: Failed to create system directory nfs Sep 6 00:32:30.968245 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.969426 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.970702 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.971956 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.978446 kernel: Failed to create system directory nfs Sep 6 00:32:30.978553 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:30.981373 kernel: Failed to create system directory nfs Sep 6 00:32:30.981474 kernel: Failed to create system directory nfs Sep 6 00:32:30.872000 audit[3021]: AVC avc: denied { confidentiality } for pid=3021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.009454 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 6 00:32:30.872000 audit[3021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56147c50faf0 a1=16f02c a2=56144a4862b0 a3=5 items=0 ppid=74 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:30.872000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.072806 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.072927 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.073011 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.077156 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.077295 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.077369 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.080373 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.080494 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.081442 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.084418 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.084516 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.086992 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.087096 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.088404 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.089824 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.092525 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.092650 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.093929 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.095362 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.098306 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.098514 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.101130 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.101210 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.103552 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.105338 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.105463 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.108280 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.108448 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.110964 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.111064 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.113702 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.113821 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.115091 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.117035 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.121650 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.121858 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.121980 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.122035 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.123333 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.124800 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.126180 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.127447 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.128872 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.130202 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.133009 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.133110 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.134229 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.135640 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.137005 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.139694 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.139805 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.142440 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.142529 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.145116 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.145187 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.146475 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.149172 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.149287 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.150799 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.151912 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.154677 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.154787 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.156059 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.160325 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.160453 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.160515 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.163205 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.163451 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.164488 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.165910 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.167265 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.169966 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.170090 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.171268 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.173993 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.174118 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.175310 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.176588 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.177994 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.179322 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.182016 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.182145 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.183302 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.184770 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.186113 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.187478 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.190197 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.190313 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.193291 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.193514 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.196310 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.196436 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.199030 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.199156 kernel: Failed to create system directory nfs4 Sep 6 00:32:31.048000 audit[3027]: AVC avc: denied { confidentiality } for pid=3027 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.360065 kernel: NFS: Registering the id_resolver key type Sep 6 00:32:31.360220 kernel: Key type id_resolver registered Sep 6 00:32:31.360280 kernel: Key type id_legacy registered Sep 6 00:32:31.048000 audit[3027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe7bf404010 a1=20955c a2=55ca92d6b2b0 a3=5 items=0 ppid=74 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:31.048000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.382486 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.382623 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.382700 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.383761 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.389657 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.389861 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.389904 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.389971 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.393475 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.393725 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.393824 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.398769 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.399071 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.399268 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.399326 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.400737 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.401900 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.403441 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.406433 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.406566 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.407786 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.416439 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.416664 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.416717 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.416754 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.416795 kernel: Failed to create system directory rpcgss Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:32:31.374000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe41c404010 a1=70bac a2=55bd3c2642b0 a3=5 items=0 ppid=74 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:31.374000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 6 00:32:31.469330 nfsidmap[3039]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Sep 6 00:32:31.477763 nfsidmap[3042]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Sep 6 00:32:31.492000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:32:31.492000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55db265340d0 a2=10 a3=9f25b59514ebe93 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:31.492000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:32:31.492000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:32:31.492000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55db265340d0 a2=10 a3=9f25b59514ebe93 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:31.492000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:32:31.492000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:32:31.492000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55db265340d0 a2=10 a3=9f25b59514ebe93 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:31.492000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 00:32:31.493000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:32:31.493000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:32:31.493000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 00:32:31.673447 kubelet[1507]: E0906 00:32:31.672009 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:31.734754 env[1196]: time="2025-09-06T00:32:31.734575295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a3a0b817-6154-4d63-9780-a6715353f2ea,Namespace:default,Attempt:0,}" Sep 6 00:32:32.189570 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP Sep 6 00:32:32.199111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:32:32.199299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 6 00:32:32.200267 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:31.904 [INFO][3045] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.26.66-k8s-test--pod--1-eth0 default a3a0b817-6154-4d63-9780-a6715353f2ea 1636 0 2025-09-06 00:32:19 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.26.66 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:31.905 [INFO][3045] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-eth0" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:31.984 [INFO][3058] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" HandleID="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Workload="10.244.26.66-k8s-test--pod--1-eth0" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:31.984 [INFO][3058] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" HandleID="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Workload="10.244.26.66-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9230), Attrs:map[string]string{"namespace":"default", "node":"10.244.26.66", "pod":"test-pod-1", "timestamp":"2025-09-06 00:32:31.984067117 +0000 UTC"}, Hostname:"10.244.26.66", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:31.984 [INFO][3058] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:31.984 [INFO][3058] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:31.984 [INFO][3058] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.26.66' Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.054 [INFO][3058] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.081 [INFO][3058] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.103 [INFO][3058] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.107 [INFO][3058] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.117 [INFO][3058] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.117 [INFO][3058] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.124 [INFO][3058] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.152 [INFO][3058] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.169 [INFO][3058] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.196/26] block=192.168.75.192/26 handle="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.169 [INFO][3058] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.196/26] handle="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" host="10.244.26.66" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.169 [INFO][3058] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.169 [INFO][3058] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.196/26] IPv6=[] ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" HandleID="k8s-pod-network.ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Workload="10.244.26.66-k8s-test--pod--1-eth0" Sep 6 00:32:32.278354 env[1196]: 2025-09-06 00:32:32.171 [INFO][3045] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a3a0b817-6154-4d63-9780-a6715353f2ea", ResourceVersion:"1636", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:32.279948 env[1196]: 2025-09-06 00:32:32.172 [INFO][3045] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.196/32] ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-eth0" Sep 6 00:32:32.279948 env[1196]: 2025-09-06 00:32:32.172 [INFO][3045] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-eth0" Sep 6 00:32:32.279948 env[1196]: 2025-09-06 00:32:32.200 [INFO][3045] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-eth0" Sep 6 00:32:32.279948 env[1196]: 2025-09-06 00:32:32.201 [INFO][3045] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.26.66-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a3a0b817-6154-4d63-9780-a6715353f2ea", ResourceVersion:"1636", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 32, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.26.66", ContainerID:"ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"82:b6:7c:68:88:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:32:32.279948 env[1196]: 2025-09-06 00:32:32.274 [INFO][3045] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.26.66-k8s-test--pod--1-eth0" Sep 6 00:32:32.302302 env[1196]: time="2025-09-06T00:32:32.301445281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:32:32.302302 env[1196]: time="2025-09-06T00:32:32.301597896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:32:32.302302 env[1196]: time="2025-09-06T00:32:32.301671090Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:32:32.302302 env[1196]: time="2025-09-06T00:32:32.301983298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e pid=3080 runtime=io.containerd.runc.v2 Sep 6 00:32:32.329000 audit[3099]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:32:32.329000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff083defd0 a2=0 a3=7fff083defbc items=0 ppid=2234 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.329000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:32:32.350205 systemd[1]: Started cri-containerd-ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e.scope. Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.381000 audit: BPF prog-id=129 op=LOAD Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3080 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323032383064386263316664373664313436356233353837323330 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3080 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323032383064386263316664373664313436356233353837323330 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit: BPF prog-id=130 op=LOAD Sep 6 00:32:32.383000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009d8d0 items=0 ppid=3080 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323032383064386263316664373664313436356233353837323330 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.383000 audit: BPF prog-id=131 op=LOAD Sep 6 00:32:32.383000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009d918 items=0 ppid=3080 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323032383064386263316664373664313436356233353837323330 Sep 6 00:32:32.383000 audit: BPF prog-id=131 op=UNLOAD Sep 6 00:32:32.383000 audit: BPF prog-id=130 op=UNLOAD Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.384000 audit: BPF prog-id=132 op=LOAD Sep 6 00:32:32.384000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009dd28 items=0 ppid=3080 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323032383064386263316664373664313436356233353837323330 Sep 6 00:32:32.425145 env[1196]: time="2025-09-06T00:32:32.425063994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a3a0b817-6154-4d63-9780-a6715353f2ea,Namespace:default,Attempt:0,} returns sandbox id \"ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e\"" Sep 6 00:32:32.427804 env[1196]: time="2025-09-06T00:32:32.427757120Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 00:32:32.672541 kubelet[1507]: E0906 00:32:32.672322 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:32.755403 systemd[1]: run-containerd-runc-k8s.io-ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e-runc.i4AHRy.mount: Deactivated successfully. Sep 6 00:32:32.810733 env[1196]: time="2025-09-06T00:32:32.810617766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:32.813512 env[1196]: time="2025-09-06T00:32:32.813471045Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:32.815927 env[1196]: time="2025-09-06T00:32:32.815885878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:32.822219 env[1196]: time="2025-09-06T00:32:32.822149695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:32:32.823855 env[1196]: time="2025-09-06T00:32:32.823811817Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 6 00:32:32.830684 env[1196]: time="2025-09-06T00:32:32.830607785Z" level=info msg="CreateContainer within sandbox \"ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 6 00:32:32.856436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4110656458.mount: Deactivated successfully. Sep 6 00:32:32.866489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount140751437.mount: Deactivated successfully. Sep 6 00:32:32.872887 env[1196]: time="2025-09-06T00:32:32.872804264Z" level=info msg="CreateContainer within sandbox \"ba20280d8bc1fd76d1465b358723052ff15f33729cd9ea382e29cbca0e2d0a1e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"df0987a7de4d292c237bdf0aa22b10b297021850929073f958b306e646dabab1\"" Sep 6 00:32:32.874731 env[1196]: time="2025-09-06T00:32:32.874690149Z" level=info msg="StartContainer for \"df0987a7de4d292c237bdf0aa22b10b297021850929073f958b306e646dabab1\"" Sep 6 00:32:32.909969 systemd[1]: Started cri-containerd-df0987a7de4d292c237bdf0aa22b10b297021850929073f958b306e646dabab1.scope. Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.944000 audit: BPF prog-id=133 op=LOAD Sep 6 00:32:32.946000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.946000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3080 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466303938376137646534643239326332333762646630616132326231 Sep 6 00:32:32.946000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.946000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3080 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466303938376137646534643239326332333762646630616132326231 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.947000 audit: BPF prog-id=134 op=LOAD Sep 6 00:32:32.947000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034bd00 items=0 ppid=3080 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466303938376137646534643239326332333762646630616132326231 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.948000 audit: BPF prog-id=135 op=LOAD Sep 6 00:32:32.948000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034bd48 items=0 ppid=3080 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466303938376137646534643239326332333762646630616132326231 Sep 6 00:32:32.949000 audit: BPF prog-id=135 op=UNLOAD Sep 6 00:32:32.950000 audit: BPF prog-id=134 op=UNLOAD Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:32:32.950000 audit: BPF prog-id=136 op=LOAD Sep 6 00:32:32.950000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6158 items=0 ppid=3080 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:32.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466303938376137646534643239326332333762646630616132326231 Sep 6 00:32:32.990619 env[1196]: time="2025-09-06T00:32:32.988972699Z" level=info msg="StartContainer for \"df0987a7de4d292c237bdf0aa22b10b297021850929073f958b306e646dabab1\" returns successfully" Sep 6 00:32:33.457256 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL Sep 6 00:32:33.673247 kubelet[1507]: E0906 00:32:33.673149 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:34.674528 kubelet[1507]: E0906 00:32:34.674456 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:35.675879 kubelet[1507]: E0906 00:32:35.675790 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:36.677553 kubelet[1507]: E0906 00:32:36.677460 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:37.678598 kubelet[1507]: E0906 00:32:37.678519 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:38.679374 kubelet[1507]: E0906 00:32:38.679243 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:39.680301 kubelet[1507]: E0906 00:32:39.680216 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:40.682441 kubelet[1507]: E0906 00:32:40.682315 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:41.683401 kubelet[1507]: E0906 00:32:41.683269 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:42.567869 kubelet[1507]: E0906 00:32:42.567781 1507 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:42.683779 kubelet[1507]: E0906 00:32:42.683686 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:43.685104 kubelet[1507]: E0906 00:32:43.684983 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:44.686306 kubelet[1507]: E0906 00:32:44.686208 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:45.221437 systemd[1]: run-containerd-runc-k8s.io-0e9e767c0f5c72c06dc0a389796932bd7aa07789aecf49ecd6af4f6843395156-runc.iWBC8o.mount: Deactivated successfully. Sep 6 00:32:45.688023 kubelet[1507]: E0906 00:32:45.687897 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 00:32:46.689655 kubelet[1507]: E0906 00:32:46.689447 1507 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"