Sep 6 01:22:58.021647 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Sep 6 01:22:58.021665 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 5 23:00:12 -00 2025 Sep 6 01:22:58.021673 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Sep 6 01:22:58.021679 kernel: printk: bootconsole [pl11] enabled Sep 6 01:22:58.021685 kernel: efi: EFI v2.70 by EDK II Sep 6 01:22:58.021690 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3761cf98 Sep 6 01:22:58.021697 kernel: random: crng init done Sep 6 01:22:58.021702 kernel: ACPI: Early table checksum verification disabled Sep 6 01:22:58.021708 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Sep 6 01:22:58.021713 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021719 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021724 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 6 01:22:58.021730 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021736 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021743 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021748 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021754 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021761 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021767 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Sep 6 01:22:58.021773 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 6 01:22:58.021779 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Sep 6 01:22:58.021785 kernel: NUMA: Failed to initialise from firmware Sep 6 01:22:58.021791 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Sep 6 01:22:58.021796 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Sep 6 01:22:58.021802 kernel: Zone ranges: Sep 6 01:22:58.021808 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Sep 6 01:22:58.021814 kernel: DMA32 empty Sep 6 01:22:58.021819 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Sep 6 01:22:58.021826 kernel: Movable zone start for each node Sep 6 01:22:58.021832 kernel: Early memory node ranges Sep 6 01:22:58.021838 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Sep 6 01:22:58.021844 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Sep 6 01:22:58.021850 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Sep 6 01:22:58.021855 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Sep 6 01:22:58.021861 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Sep 6 01:22:58.021867 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Sep 6 01:22:58.021873 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Sep 6 01:22:58.021878 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Sep 6 01:22:58.021884 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Sep 6 01:22:58.021890 kernel: psci: probing for conduit method from ACPI. Sep 6 01:22:58.021899 kernel: psci: PSCIv1.1 detected in firmware. Sep 6 01:22:58.021906 kernel: psci: Using standard PSCI v0.2 function IDs Sep 6 01:22:58.021912 kernel: psci: MIGRATE_INFO_TYPE not supported. Sep 6 01:22:58.021918 kernel: psci: SMC Calling Convention v1.4 Sep 6 01:22:58.021924 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Sep 6 01:22:58.021932 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Sep 6 01:22:58.021938 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Sep 6 01:22:58.021944 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Sep 6 01:22:58.021950 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 6 01:22:58.021956 kernel: Detected PIPT I-cache on CPU0 Sep 6 01:22:58.021962 kernel: CPU features: detected: GIC system register CPU interface Sep 6 01:22:58.021968 kernel: CPU features: detected: Hardware dirty bit management Sep 6 01:22:58.021974 kernel: CPU features: detected: Spectre-BHB Sep 6 01:22:58.021981 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 6 01:22:58.021987 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 6 01:22:58.021993 kernel: CPU features: detected: ARM erratum 1418040 Sep 6 01:22:58.022000 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Sep 6 01:22:58.022006 kernel: CPU features: detected: SSBS not fully self-synchronizing Sep 6 01:22:58.022012 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Sep 6 01:22:58.022018 kernel: Policy zone: Normal Sep 6 01:22:58.022026 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5cb382ab59aa1336098b36da02e2d4491706a6fda80ee56c4ff8582cce9206a4 Sep 6 01:22:58.022032 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 01:22:58.022038 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 6 01:22:58.022045 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 01:22:58.022051 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 01:22:58.022057 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Sep 6 01:22:58.022064 kernel: Memory: 3986880K/4194160K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 207280K reserved, 0K cma-reserved) Sep 6 01:22:58.031141 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 6 01:22:58.031159 kernel: trace event string verifier disabled Sep 6 01:22:58.031166 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 6 01:22:58.031174 kernel: rcu: RCU event tracing is enabled. Sep 6 01:22:58.031180 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 6 01:22:58.031187 kernel: Trampoline variant of Tasks RCU enabled. Sep 6 01:22:58.031193 kernel: Tracing variant of Tasks RCU enabled. Sep 6 01:22:58.031200 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 01:22:58.031206 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 6 01:22:58.031212 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 6 01:22:58.031219 kernel: GICv3: 960 SPIs implemented Sep 6 01:22:58.031232 kernel: GICv3: 0 Extended SPIs implemented Sep 6 01:22:58.031238 kernel: GICv3: Distributor has no Range Selector support Sep 6 01:22:58.031244 kernel: Root IRQ handler: gic_handle_irq Sep 6 01:22:58.031251 kernel: GICv3: 16 PPIs implemented Sep 6 01:22:58.031257 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Sep 6 01:22:58.031263 kernel: ITS: No ITS available, not enabling LPIs Sep 6 01:22:58.031270 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 6 01:22:58.031276 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Sep 6 01:22:58.031283 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Sep 6 01:22:58.031289 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Sep 6 01:22:58.031296 kernel: Console: colour dummy device 80x25 Sep 6 01:22:58.031304 kernel: printk: console [tty1] enabled Sep 6 01:22:58.031311 kernel: ACPI: Core revision 20210730 Sep 6 01:22:58.031318 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Sep 6 01:22:58.031324 kernel: pid_max: default: 32768 minimum: 301 Sep 6 01:22:58.031331 kernel: LSM: Security Framework initializing Sep 6 01:22:58.031337 kernel: SELinux: Initializing. Sep 6 01:22:58.031344 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 6 01:22:58.031350 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 6 01:22:58.031357 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Sep 6 01:22:58.031365 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 Sep 6 01:22:58.031371 kernel: rcu: Hierarchical SRCU implementation. Sep 6 01:22:58.031377 kernel: Remapping and enabling EFI services. Sep 6 01:22:58.031384 kernel: smp: Bringing up secondary CPUs ... Sep 6 01:22:58.031390 kernel: Detected PIPT I-cache on CPU1 Sep 6 01:22:58.031397 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Sep 6 01:22:58.031403 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 6 01:22:58.031409 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Sep 6 01:22:58.031416 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 01:22:58.031422 kernel: SMP: Total of 2 processors activated. Sep 6 01:22:58.031430 kernel: CPU features: detected: 32-bit EL0 Support Sep 6 01:22:58.031437 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Sep 6 01:22:58.031443 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Sep 6 01:22:58.031450 kernel: CPU features: detected: CRC32 instructions Sep 6 01:22:58.031456 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Sep 6 01:22:58.031462 kernel: CPU features: detected: LSE atomic instructions Sep 6 01:22:58.031469 kernel: CPU features: detected: Privileged Access Never Sep 6 01:22:58.031475 kernel: CPU: All CPU(s) started at EL1 Sep 6 01:22:58.031482 kernel: alternatives: patching kernel code Sep 6 01:22:58.031490 kernel: devtmpfs: initialized Sep 6 01:22:58.031501 kernel: KASLR enabled Sep 6 01:22:58.031508 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 01:22:58.031516 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 6 01:22:58.031523 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 01:22:58.031530 kernel: SMBIOS 3.1.0 present. Sep 6 01:22:58.031536 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 6 01:22:58.031543 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 01:22:58.031550 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 6 01:22:58.031558 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 6 01:22:58.031565 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 6 01:22:58.031572 kernel: audit: initializing netlink subsys (disabled) Sep 6 01:22:58.031579 kernel: audit: type=2000 audit(0.091:1): state=initialized audit_enabled=0 res=1 Sep 6 01:22:58.031586 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 01:22:58.031593 kernel: cpuidle: using governor menu Sep 6 01:22:58.031599 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 6 01:22:58.031608 kernel: ASID allocator initialised with 32768 entries Sep 6 01:22:58.031615 kernel: ACPI: bus type PCI registered Sep 6 01:22:58.031621 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 01:22:58.031628 kernel: Serial: AMBA PL011 UART driver Sep 6 01:22:58.031635 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 01:22:58.031642 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 6 01:22:58.031649 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 01:22:58.031655 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 6 01:22:58.031662 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 01:22:58.031671 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 6 01:22:58.031678 kernel: ACPI: Added _OSI(Module Device) Sep 6 01:22:58.031685 kernel: ACPI: Added _OSI(Processor Device) Sep 6 01:22:58.031691 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 01:22:58.031698 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 01:22:58.031704 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 01:22:58.031711 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 01:22:58.031718 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 01:22:58.031725 kernel: ACPI: Interpreter enabled Sep 6 01:22:58.031733 kernel: ACPI: Using GIC for interrupt routing Sep 6 01:22:58.031740 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Sep 6 01:22:58.031747 kernel: printk: console [ttyAMA0] enabled Sep 6 01:22:58.031754 kernel: printk: bootconsole [pl11] disabled Sep 6 01:22:58.031761 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Sep 6 01:22:58.031768 kernel: iommu: Default domain type: Translated Sep 6 01:22:58.031774 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 6 01:22:58.031781 kernel: vgaarb: loaded Sep 6 01:22:58.031787 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 01:22:58.031794 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 01:22:58.031802 kernel: PTP clock support registered Sep 6 01:22:58.031809 kernel: Registered efivars operations Sep 6 01:22:58.031815 kernel: No ACPI PMU IRQ for CPU0 Sep 6 01:22:58.031822 kernel: No ACPI PMU IRQ for CPU1 Sep 6 01:22:58.031829 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 6 01:22:58.031835 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 01:22:58.031842 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 01:22:58.031849 kernel: pnp: PnP ACPI init Sep 6 01:22:58.031855 kernel: pnp: PnP ACPI: found 0 devices Sep 6 01:22:58.031863 kernel: NET: Registered PF_INET protocol family Sep 6 01:22:58.031870 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 6 01:22:58.031877 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 6 01:22:58.031884 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 01:22:58.031892 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 01:22:58.031898 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 6 01:22:58.031905 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 6 01:22:58.031912 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 6 01:22:58.031920 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 6 01:22:58.031927 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 01:22:58.031933 kernel: PCI: CLS 0 bytes, default 64 Sep 6 01:22:58.031940 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Sep 6 01:22:58.031947 kernel: kvm [1]: HYP mode not available Sep 6 01:22:58.031954 kernel: Initialise system trusted keyrings Sep 6 01:22:58.031960 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 6 01:22:58.031967 kernel: Key type asymmetric registered Sep 6 01:22:58.031973 kernel: Asymmetric key parser 'x509' registered Sep 6 01:22:58.031982 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 01:22:58.031989 kernel: io scheduler mq-deadline registered Sep 6 01:22:58.031995 kernel: io scheduler kyber registered Sep 6 01:22:58.032002 kernel: io scheduler bfq registered Sep 6 01:22:58.032009 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 01:22:58.032015 kernel: thunder_xcv, ver 1.0 Sep 6 01:22:58.032022 kernel: thunder_bgx, ver 1.0 Sep 6 01:22:58.032029 kernel: nicpf, ver 1.0 Sep 6 01:22:58.032035 kernel: nicvf, ver 1.0 Sep 6 01:22:58.032192 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 6 01:22:58.032259 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-06T01:22:57 UTC (1757121777) Sep 6 01:22:58.032268 kernel: efifb: probing for efifb Sep 6 01:22:58.032275 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 6 01:22:58.032282 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 6 01:22:58.032289 kernel: efifb: scrolling: redraw Sep 6 01:22:58.032296 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 6 01:22:58.032303 kernel: Console: switching to colour frame buffer device 128x48 Sep 6 01:22:58.032311 kernel: fb0: EFI VGA frame buffer device Sep 6 01:22:58.032318 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Sep 6 01:22:58.032325 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 01:22:58.032332 kernel: NET: Registered PF_INET6 protocol family Sep 6 01:22:58.032339 kernel: Segment Routing with IPv6 Sep 6 01:22:58.032345 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 01:22:58.032352 kernel: NET: Registered PF_PACKET protocol family Sep 6 01:22:58.032359 kernel: Key type dns_resolver registered Sep 6 01:22:58.032365 kernel: registered taskstats version 1 Sep 6 01:22:58.032372 kernel: Loading compiled-in X.509 certificates Sep 6 01:22:58.032380 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 72ab5ba99c2368429c7a4d04fccfc5a39dd84386' Sep 6 01:22:58.032387 kernel: Key type .fscrypt registered Sep 6 01:22:58.032393 kernel: Key type fscrypt-provisioning registered Sep 6 01:22:58.032400 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 01:22:58.032407 kernel: ima: Allocated hash algorithm: sha1 Sep 6 01:22:58.032414 kernel: ima: No architecture policies found Sep 6 01:22:58.032421 kernel: clk: Disabling unused clocks Sep 6 01:22:58.032427 kernel: Freeing unused kernel memory: 36416K Sep 6 01:22:58.032435 kernel: Run /init as init process Sep 6 01:22:58.032442 kernel: with arguments: Sep 6 01:22:58.032448 kernel: /init Sep 6 01:22:58.032455 kernel: with environment: Sep 6 01:22:58.032461 kernel: HOME=/ Sep 6 01:22:58.032467 kernel: TERM=linux Sep 6 01:22:58.032474 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 01:22:58.032483 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:22:58.032493 systemd[1]: Detected virtualization microsoft. Sep 6 01:22:58.032501 systemd[1]: Detected architecture arm64. Sep 6 01:22:58.032508 systemd[1]: Running in initrd. Sep 6 01:22:58.032515 systemd[1]: No hostname configured, using default hostname. Sep 6 01:22:58.032521 systemd[1]: Hostname set to . Sep 6 01:22:58.032529 systemd[1]: Initializing machine ID from random generator. Sep 6 01:22:58.032536 systemd[1]: Queued start job for default target initrd.target. Sep 6 01:22:58.032543 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:22:58.032552 systemd[1]: Reached target cryptsetup.target. Sep 6 01:22:58.032559 systemd[1]: Reached target paths.target. Sep 6 01:22:58.032566 systemd[1]: Reached target slices.target. Sep 6 01:22:58.032573 systemd[1]: Reached target swap.target. Sep 6 01:22:58.032580 systemd[1]: Reached target timers.target. Sep 6 01:22:58.032588 systemd[1]: Listening on iscsid.socket. Sep 6 01:22:58.032595 systemd[1]: Listening on iscsiuio.socket. Sep 6 01:22:58.032602 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 01:22:58.032611 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 01:22:58.032618 systemd[1]: Listening on systemd-journald.socket. Sep 6 01:22:58.032625 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:22:58.032633 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:22:58.032640 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:22:58.032647 systemd[1]: Reached target sockets.target. Sep 6 01:22:58.032654 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:22:58.032661 systemd[1]: Finished network-cleanup.service. Sep 6 01:22:58.032668 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 01:22:58.032677 systemd[1]: Starting systemd-journald.service... Sep 6 01:22:58.032684 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:22:58.032691 systemd[1]: Starting systemd-resolved.service... Sep 6 01:22:58.032698 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 01:22:58.032710 systemd-journald[276]: Journal started Sep 6 01:22:58.032756 systemd-journald[276]: Runtime Journal (/run/log/journal/0c7a9639d3fc40cf907bbda7767838a4) is 8.0M, max 78.5M, 70.5M free. Sep 6 01:22:58.025693 systemd-modules-load[277]: Inserted module 'overlay' Sep 6 01:22:58.065341 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 01:22:58.066092 systemd[1]: Started systemd-journald.service. Sep 6 01:22:58.078268 kernel: Bridge firewalling registered Sep 6 01:22:58.078415 systemd-modules-load[277]: Inserted module 'br_netfilter' Sep 6 01:22:58.113053 kernel: audit: type=1130 audit(1757121778.086:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.083015 systemd-resolved[278]: Positive Trust Anchors: Sep 6 01:22:58.147236 kernel: SCSI subsystem initialized Sep 6 01:22:58.147257 kernel: audit: type=1130 audit(1757121778.112:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.147276 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 01:22:58.147285 kernel: device-mapper: uevent: version 1.0.3 Sep 6 01:22:58.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.083024 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:22:58.170165 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 01:22:58.083055 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:22:58.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.085281 systemd-resolved[278]: Defaulting to hostname 'linux'. Sep 6 01:22:58.227221 kernel: audit: type=1130 audit(1757121778.174:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.086582 systemd[1]: Started systemd-resolved.service. Sep 6 01:22:58.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.113324 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:22:58.168535 systemd-modules-load[277]: Inserted module 'dm_multipath' Sep 6 01:22:58.285563 kernel: audit: type=1130 audit(1757121778.231:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.285599 kernel: audit: type=1130 audit(1757121778.256:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.222959 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 01:22:58.231806 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:22:58.315627 kernel: audit: type=1130 audit(1757121778.286:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.256712 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 01:22:58.286323 systemd[1]: Reached target nss-lookup.target. Sep 6 01:22:58.316216 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 01:22:58.329781 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:22:58.341271 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:22:58.359310 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:22:58.366470 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 01:22:58.408075 kernel: audit: type=1130 audit(1757121778.366:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.408105 kernel: audit: type=1130 audit(1757121778.391:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.391466 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:22:58.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.435721 systemd[1]: Starting dracut-cmdline.service... Sep 6 01:22:58.446792 kernel: audit: type=1130 audit(1757121778.414:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.449530 dracut-cmdline[300]: dracut-dracut-053 Sep 6 01:22:58.453688 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5cb382ab59aa1336098b36da02e2d4491706a6fda80ee56c4ff8582cce9206a4 Sep 6 01:22:58.518085 kernel: Loading iSCSI transport class v2.0-870. Sep 6 01:22:58.531098 kernel: iscsi: registered transport (tcp) Sep 6 01:22:58.552349 kernel: iscsi: registered transport (qla4xxx) Sep 6 01:22:58.552410 kernel: QLogic iSCSI HBA Driver Sep 6 01:22:58.585105 systemd[1]: Finished dracut-cmdline.service. Sep 6 01:22:58.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:58.590663 systemd[1]: Starting dracut-pre-udev.service... Sep 6 01:22:58.645093 kernel: raid6: neonx8 gen() 13737 MB/s Sep 6 01:22:58.666088 kernel: raid6: neonx8 xor() 10780 MB/s Sep 6 01:22:58.685081 kernel: raid6: neonx4 gen() 13545 MB/s Sep 6 01:22:58.706082 kernel: raid6: neonx4 xor() 10981 MB/s Sep 6 01:22:58.726079 kernel: raid6: neonx2 gen() 12953 MB/s Sep 6 01:22:58.746080 kernel: raid6: neonx2 xor() 10246 MB/s Sep 6 01:22:58.767080 kernel: raid6: neonx1 gen() 10517 MB/s Sep 6 01:22:58.788080 kernel: raid6: neonx1 xor() 8795 MB/s Sep 6 01:22:58.809082 kernel: raid6: int64x8 gen() 6273 MB/s Sep 6 01:22:58.831080 kernel: raid6: int64x8 xor() 3542 MB/s Sep 6 01:22:58.852081 kernel: raid6: int64x4 gen() 7249 MB/s Sep 6 01:22:58.873079 kernel: raid6: int64x4 xor() 3855 MB/s Sep 6 01:22:58.895079 kernel: raid6: int64x2 gen() 6106 MB/s Sep 6 01:22:58.916080 kernel: raid6: int64x2 xor() 3312 MB/s Sep 6 01:22:58.936080 kernel: raid6: int64x1 gen() 5047 MB/s Sep 6 01:22:58.961695 kernel: raid6: int64x1 xor() 2645 MB/s Sep 6 01:22:58.961709 kernel: raid6: using algorithm neonx8 gen() 13737 MB/s Sep 6 01:22:58.961718 kernel: raid6: .... xor() 10780 MB/s, rmw enabled Sep 6 01:22:58.966211 kernel: raid6: using neon recovery algorithm Sep 6 01:22:58.984082 kernel: xor: measuring software checksum speed Sep 6 01:22:58.988080 kernel: 8regs : 16381 MB/sec Sep 6 01:22:58.992079 kernel: 32regs : 19627 MB/sec Sep 6 01:22:59.000409 kernel: arm64_neon : 25907 MB/sec Sep 6 01:22:59.000418 kernel: xor: using function: arm64_neon (25907 MB/sec) Sep 6 01:22:59.058087 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 6 01:22:59.068234 systemd[1]: Finished dracut-pre-udev.service. Sep 6 01:22:59.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:59.076000 audit: BPF prog-id=7 op=LOAD Sep 6 01:22:59.076000 audit: BPF prog-id=8 op=LOAD Sep 6 01:22:59.077290 systemd[1]: Starting systemd-udevd.service... Sep 6 01:22:59.095880 systemd-udevd[477]: Using default interface naming scheme 'v252'. Sep 6 01:22:59.103160 systemd[1]: Started systemd-udevd.service. Sep 6 01:22:59.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:59.116115 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 01:22:59.130710 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation Sep 6 01:22:59.161263 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 01:22:59.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:59.167480 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:22:59.205945 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:22:59.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:59.255096 kernel: hv_vmbus: Vmbus version:5.3 Sep 6 01:22:59.271975 kernel: hv_vmbus: registering driver hid_hyperv Sep 6 01:22:59.272046 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 6 01:22:59.279617 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Sep 6 01:22:59.279670 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Sep 6 01:22:59.300627 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 6 01:22:59.312098 kernel: hv_vmbus: registering driver hv_storvsc Sep 6 01:22:59.317097 kernel: scsi host0: storvsc_host_t Sep 6 01:22:59.317258 kernel: scsi host1: storvsc_host_t Sep 6 01:22:59.328185 kernel: scsi 1:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 6 01:22:59.337084 kernel: scsi 1:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Sep 6 01:22:59.337168 kernel: hv_vmbus: registering driver hv_netvsc Sep 6 01:22:59.360104 kernel: sr 1:0:0:2: [sr0] scsi-1 drive Sep 6 01:22:59.369932 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 6 01:22:59.369957 kernel: sd 1:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 6 01:22:59.399507 kernel: sr 1:0:0:2: Attached scsi CD-ROM sr0 Sep 6 01:22:59.399631 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Sep 6 01:22:59.399718 kernel: sd 1:0:0:0: [sda] Write Protect is off Sep 6 01:22:59.399797 kernel: sd 1:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 6 01:22:59.399877 kernel: sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 6 01:22:59.399956 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 01:22:59.399974 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Sep 6 01:22:59.492854 kernel: hv_netvsc 000d3af9-3724-000d-3af9-3724000d3af9 eth0: VF slot 1 added Sep 6 01:22:59.510174 kernel: hv_vmbus: registering driver hv_pci Sep 6 01:22:59.510258 kernel: hv_pci 95dd9356-a72b-40c7-8cfc-240ee5ed4092: PCI VMBus probing: Using version 0x10004 Sep 6 01:22:59.809021 kernel: hv_pci 95dd9356-a72b-40c7-8cfc-240ee5ed4092: PCI host bridge to bus a72b:00 Sep 6 01:22:59.809138 kernel: pci_bus a72b:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Sep 6 01:22:59.809247 kernel: pci_bus a72b:00: No busn resource found for root bus, will use [bus 00-ff] Sep 6 01:22:59.809325 kernel: pci a72b:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 6 01:22:59.809433 kernel: pci a72b:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 6 01:22:59.809518 kernel: pci a72b:00:02.0: enabling Extended Tags Sep 6 01:22:59.809600 kernel: pci a72b:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at a72b:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 6 01:22:59.809687 kernel: pci_bus a72b:00: busn_res: [bus 00-ff] end is updated to 00 Sep 6 01:22:59.809766 kernel: pci a72b:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 6 01:22:59.848365 kernel: mlx5_core a72b:00:02.0: enabling device (0000 -> 0002) Sep 6 01:23:00.179238 kernel: mlx5_core a72b:00:02.0: firmware version: 16.31.2424 Sep 6 01:23:00.179360 kernel: mlx5_core a72b:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 6 01:23:00.179443 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (537) Sep 6 01:23:00.179453 kernel: hv_netvsc 000d3af9-3724-000d-3af9-3724000d3af9 eth0: VF registering: eth1 Sep 6 01:23:00.179535 kernel: mlx5_core a72b:00:02.0 eth1: joined to eth0 Sep 6 01:23:00.082813 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:23:00.098216 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 01:23:00.196893 kernel: mlx5_core a72b:00:02.0 enP42795s1: renamed from eth1 Sep 6 01:23:00.262617 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 01:23:00.273868 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 01:23:00.282662 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 01:23:00.299500 systemd[1]: Starting disk-uuid.service... Sep 6 01:23:01.339826 disk-uuid[605]: The operation has completed successfully. Sep 6 01:23:01.345345 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 6 01:23:01.402184 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 01:23:01.407434 systemd[1]: Finished disk-uuid.service. Sep 6 01:23:01.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:01.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:01.416876 systemd[1]: Starting verity-setup.service... Sep 6 01:23:01.461179 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 6 01:23:01.694956 systemd[1]: Found device dev-mapper-usr.device. Sep 6 01:23:01.701313 systemd[1]: Mounting sysusr-usr.mount... Sep 6 01:23:01.709146 systemd[1]: Finished verity-setup.service. Sep 6 01:23:01.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:01.777101 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 01:23:01.777378 systemd[1]: Mounted sysusr-usr.mount. Sep 6 01:23:01.782439 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 01:23:01.783298 systemd[1]: Starting ignition-setup.service... Sep 6 01:23:01.794293 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 01:23:01.838447 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 6 01:23:01.838512 kernel: BTRFS info (device sda6): using free space tree Sep 6 01:23:01.844310 kernel: BTRFS info (device sda6): has skinny extents Sep 6 01:23:01.882158 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 01:23:01.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:01.892000 audit: BPF prog-id=9 op=LOAD Sep 6 01:23:01.892911 systemd[1]: Starting systemd-networkd.service... Sep 6 01:23:01.912384 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 01:23:01.921511 systemd-networkd[820]: lo: Link UP Sep 6 01:23:01.921523 systemd-networkd[820]: lo: Gained carrier Sep 6 01:23:01.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:01.921976 systemd-networkd[820]: Enumeration completed Sep 6 01:23:01.925342 systemd[1]: Started systemd-networkd.service. Sep 6 01:23:01.930681 systemd[1]: Reached target network.target. Sep 6 01:23:01.939226 systemd-networkd[820]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:23:01.952671 systemd[1]: Starting iscsiuio.service... Sep 6 01:23:01.964573 systemd[1]: Started iscsiuio.service. Sep 6 01:23:01.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:01.974012 systemd[1]: Starting iscsid.service... Sep 6 01:23:02.013246 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 6 01:23:02.013279 kernel: audit: type=1130 audit(1757121781.972:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.013292 iscsid[829]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:23:02.013292 iscsid[829]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 6 01:23:02.013292 iscsid[829]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 01:23:02.013292 iscsid[829]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 01:23:02.013292 iscsid[829]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 01:23:02.013292 iscsid[829]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:23:02.013292 iscsid[829]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 01:23:02.153189 kernel: audit: type=1130 audit(1757121782.017:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.153213 kernel: audit: type=1130 audit(1757121782.075:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.009283 systemd[1]: Started iscsid.service. Sep 6 01:23:02.042201 systemd[1]: Starting dracut-initqueue.service... Sep 6 01:23:02.056585 systemd[1]: Finished dracut-initqueue.service. Sep 6 01:23:02.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.075702 systemd[1]: Reached target remote-fs-pre.target. Sep 6 01:23:02.112167 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:23:02.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.131900 systemd[1]: Reached target remote-fs.target. Sep 6 01:23:02.238193 kernel: audit: type=1130 audit(1757121782.174:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.238244 kernel: audit: type=1130 audit(1757121782.205:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:02.152577 systemd[1]: Starting dracut-pre-mount.service... Sep 6 01:23:02.164326 systemd[1]: Finished ignition-setup.service. Sep 6 01:23:02.196813 systemd[1]: Finished dracut-pre-mount.service. Sep 6 01:23:02.210670 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 01:23:02.264089 kernel: mlx5_core a72b:00:02.0 enP42795s1: Link up Sep 6 01:23:02.369088 kernel: hv_netvsc 000d3af9-3724-000d-3af9-3724000d3af9 eth0: Data path switched to VF: enP42795s1 Sep 6 01:23:02.375085 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:23:02.375347 systemd-networkd[820]: enP42795s1: Link UP Sep 6 01:23:02.375554 systemd-networkd[820]: eth0: Link UP Sep 6 01:23:02.375944 systemd-networkd[820]: eth0: Gained carrier Sep 6 01:23:02.389603 systemd-networkd[820]: enP42795s1: Gained carrier Sep 6 01:23:02.403154 systemd-networkd[820]: eth0: DHCPv4 address 10.200.20.40/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 6 01:23:03.507227 systemd-networkd[820]: eth0: Gained IPv6LL Sep 6 01:23:04.333108 ignition[844]: Ignition 2.14.0 Sep 6 01:23:04.333125 ignition[844]: Stage: fetch-offline Sep 6 01:23:04.333199 ignition[844]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:23:04.333224 ignition[844]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 01:23:04.412024 ignition[844]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 01:23:04.412242 ignition[844]: parsed url from cmdline: "" Sep 6 01:23:04.412246 ignition[844]: no config URL provided Sep 6 01:23:04.412252 ignition[844]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:23:04.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.426028 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 01:23:04.412261 ignition[844]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:23:04.473468 kernel: audit: type=1130 audit(1757121784.435:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.466288 systemd[1]: Starting ignition-fetch.service... Sep 6 01:23:04.412267 ignition[844]: failed to fetch config: resource requires networking Sep 6 01:23:04.412625 ignition[844]: Ignition finished successfully Sep 6 01:23:04.477919 ignition[850]: Ignition 2.14.0 Sep 6 01:23:04.477926 ignition[850]: Stage: fetch Sep 6 01:23:04.478041 ignition[850]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:23:04.478062 ignition[850]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 01:23:04.485317 ignition[850]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 01:23:04.485525 ignition[850]: parsed url from cmdline: "" Sep 6 01:23:04.485530 ignition[850]: no config URL provided Sep 6 01:23:04.485544 ignition[850]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:23:04.485554 ignition[850]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:23:04.485590 ignition[850]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 6 01:23:04.654134 ignition[850]: GET result: OK Sep 6 01:23:04.654189 ignition[850]: config has been read from IMDS userdata Sep 6 01:23:04.656417 unknown[850]: fetched base config from "system" Sep 6 01:23:04.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.654207 ignition[850]: parsing config with SHA512: 47ebb6bef198475507499326652f9b01d4f414dde448194ee6206d7eaa3eb8915ba6dbd06a9a5604a76b284ecb575b798b16a47643654f799fce045752f47f75 Sep 6 01:23:04.656424 unknown[850]: fetched base config from "system" Sep 6 01:23:04.701217 kernel: audit: type=1130 audit(1757121784.668:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.656805 ignition[850]: fetch: fetch complete Sep 6 01:23:04.656429 unknown[850]: fetched user config from "azure" Sep 6 01:23:04.656810 ignition[850]: fetch: fetch passed Sep 6 01:23:04.658485 systemd[1]: Finished ignition-fetch.service. Sep 6 01:23:04.747265 kernel: audit: type=1130 audit(1757121784.720:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.656852 ignition[850]: Ignition finished successfully Sep 6 01:23:04.669584 systemd[1]: Starting ignition-kargs.service... Sep 6 01:23:04.702239 ignition[856]: Ignition 2.14.0 Sep 6 01:23:04.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.711343 systemd[1]: Finished ignition-kargs.service. Sep 6 01:23:04.702246 ignition[856]: Stage: kargs Sep 6 01:23:04.801247 kernel: audit: type=1130 audit(1757121784.761:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.721408 systemd[1]: Starting ignition-disks.service... Sep 6 01:23:04.702381 ignition[856]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:23:04.756720 systemd[1]: Finished ignition-disks.service. Sep 6 01:23:04.702409 ignition[856]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 01:23:04.762122 systemd[1]: Reached target initrd-root-device.target. Sep 6 01:23:04.705789 ignition[856]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 01:23:04.788773 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:23:04.708600 ignition[856]: kargs: kargs passed Sep 6 01:23:04.798289 systemd[1]: Reached target local-fs.target. Sep 6 01:23:04.708695 ignition[856]: Ignition finished successfully Sep 6 01:23:04.805859 systemd[1]: Reached target sysinit.target. Sep 6 01:23:04.733098 ignition[862]: Ignition 2.14.0 Sep 6 01:23:04.814406 systemd[1]: Reached target basic.target. Sep 6 01:23:04.733105 ignition[862]: Stage: disks Sep 6 01:23:04.826199 systemd[1]: Starting systemd-fsck-root.service... Sep 6 01:23:04.733239 ignition[862]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:23:04.733260 ignition[862]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 01:23:04.890945 systemd-fsck[870]: ROOT: clean, 629/7326000 files, 481083/7359488 blocks Sep 6 01:23:04.736046 ignition[862]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 01:23:04.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.894712 systemd[1]: Finished systemd-fsck-root.service. Sep 6 01:23:04.939370 kernel: audit: type=1130 audit(1757121784.904:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:04.747456 ignition[862]: disks: disks passed Sep 6 01:23:04.938471 systemd[1]: Mounting sysroot.mount... Sep 6 01:23:04.747522 ignition[862]: Ignition finished successfully Sep 6 01:23:04.976088 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 01:23:04.969398 systemd[1]: Mounted sysroot.mount. Sep 6 01:23:04.975633 systemd[1]: Reached target initrd-root-fs.target. Sep 6 01:23:05.009270 systemd[1]: Mounting sysroot-usr.mount... Sep 6 01:23:05.015302 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 6 01:23:05.020084 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 01:23:05.020123 systemd[1]: Reached target ignition-diskful.target. Sep 6 01:23:05.030110 systemd[1]: Mounted sysroot-usr.mount. Sep 6 01:23:05.079981 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 01:23:05.085615 systemd[1]: Starting initrd-setup-root.service... Sep 6 01:23:05.112306 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (880) Sep 6 01:23:05.121370 initrd-setup-root[885]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 01:23:05.138470 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 6 01:23:05.138492 kernel: BTRFS info (device sda6): using free space tree Sep 6 01:23:05.138538 kernel: BTRFS info (device sda6): has skinny extents Sep 6 01:23:05.144990 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 01:23:05.157109 initrd-setup-root[911]: cut: /sysroot/etc/group: No such file or directory Sep 6 01:23:05.179860 initrd-setup-root[919]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 01:23:05.189897 initrd-setup-root[927]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 01:23:05.553297 systemd[1]: Finished initrd-setup-root.service. Sep 6 01:23:05.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:05.559331 systemd[1]: Starting ignition-mount.service... Sep 6 01:23:05.574020 systemd[1]: Starting sysroot-boot.service... Sep 6 01:23:05.580481 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 6 01:23:05.580602 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 6 01:23:05.609958 ignition[947]: INFO : Ignition 2.14.0 Sep 6 01:23:05.615470 ignition[947]: INFO : Stage: mount Sep 6 01:23:05.622677 ignition[947]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:23:05.622677 ignition[947]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 01:23:05.646899 ignition[947]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 01:23:05.646899 ignition[947]: INFO : mount: mount passed Sep 6 01:23:05.646899 ignition[947]: INFO : Ignition finished successfully Sep 6 01:23:05.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:05.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:05.630564 systemd[1]: Finished sysroot-boot.service. Sep 6 01:23:05.651791 systemd[1]: Finished ignition-mount.service. Sep 6 01:23:06.070630 coreos-metadata[879]: Sep 06 01:23:06.070 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 6 01:23:06.080931 coreos-metadata[879]: Sep 06 01:23:06.080 INFO Fetch successful Sep 6 01:23:06.115362 coreos-metadata[879]: Sep 06 01:23:06.115 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 6 01:23:06.127670 coreos-metadata[879]: Sep 06 01:23:06.127 INFO Fetch successful Sep 6 01:23:06.144015 coreos-metadata[879]: Sep 06 01:23:06.142 INFO wrote hostname ci-3510.3.8-n-95263eb338 to /sysroot/etc/hostname Sep 6 01:23:06.153114 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 6 01:23:06.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:06.160350 systemd[1]: Starting ignition-files.service... Sep 6 01:23:06.177261 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 01:23:06.205359 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (958) Sep 6 01:23:06.205411 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 6 01:23:06.210539 kernel: BTRFS info (device sda6): using free space tree Sep 6 01:23:06.215473 kernel: BTRFS info (device sda6): has skinny extents Sep 6 01:23:06.220017 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 01:23:06.234764 ignition[977]: INFO : Ignition 2.14.0 Sep 6 01:23:06.234764 ignition[977]: INFO : Stage: files Sep 6 01:23:06.246608 ignition[977]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:23:06.246608 ignition[977]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 01:23:06.246608 ignition[977]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 01:23:06.246608 ignition[977]: DEBUG : files: compiled without relabeling support, skipping Sep 6 01:23:06.246608 ignition[977]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 01:23:06.246608 ignition[977]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 01:23:06.332553 ignition[977]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 01:23:06.340653 ignition[977]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 01:23:06.363641 unknown[977]: wrote ssh authorized keys file for user: core Sep 6 01:23:06.369671 ignition[977]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 01:23:06.377787 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2559448599" Sep 6 01:23:06.388108 ignition[977]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2559448599": device or resource busy Sep 6 01:23:06.388108 ignition[977]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2559448599", trying btrfs: device or resource busy Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2559448599" Sep 6 01:23:06.388108 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2559448599" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2559448599" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2559448599" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3890210723" Sep 6 01:23:06.534891 ignition[977]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3890210723": device or resource busy Sep 6 01:23:06.534891 ignition[977]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3890210723", trying btrfs: device or resource busy Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3890210723" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3890210723" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3890210723" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3890210723" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 01:23:06.534891 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 Sep 6 01:23:06.947935 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 6 01:23:07.209247 ignition[977]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 6 01:23:07.209247 ignition[977]: INFO : files: op(f): [started] processing unit "waagent.service" Sep 6 01:23:07.209247 ignition[977]: INFO : files: op(f): [finished] processing unit "waagent.service" Sep 6 01:23:07.209247 ignition[977]: INFO : files: op(10): [started] processing unit "nvidia.service" Sep 6 01:23:07.209247 ignition[977]: INFO : files: op(10): [finished] processing unit "nvidia.service" Sep 6 01:23:07.209247 ignition[977]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Sep 6 01:23:07.307462 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 6 01:23:07.307486 kernel: audit: type=1130 audit(1757121787.233:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.307562 ignition[977]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Sep 6 01:23:07.307562 ignition[977]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Sep 6 01:23:07.307562 ignition[977]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Sep 6 01:23:07.307562 ignition[977]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:23:07.307562 ignition[977]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:23:07.307562 ignition[977]: INFO : files: files passed Sep 6 01:23:07.307562 ignition[977]: INFO : Ignition finished successfully Sep 6 01:23:07.437169 kernel: audit: type=1130 audit(1757121787.312:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.437194 kernel: audit: type=1130 audit(1757121787.350:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.437204 kernel: audit: type=1131 audit(1757121787.350:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.223375 systemd[1]: Finished ignition-files.service. Sep 6 01:23:07.236732 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 01:23:07.449106 initrd-setup-root-after-ignition[1002]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 01:23:07.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.276187 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 01:23:07.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.283242 systemd[1]: Starting ignition-quench.service... Sep 6 01:23:07.522725 kernel: audit: type=1130 audit(1757121787.453:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.522755 kernel: audit: type=1131 audit(1757121787.482:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.299456 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 01:23:07.338859 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 01:23:07.338961 systemd[1]: Finished ignition-quench.service. Sep 6 01:23:07.351140 systemd[1]: Reached target ignition-complete.target. Sep 6 01:23:07.410383 systemd[1]: Starting initrd-parse-etc.service... Sep 6 01:23:07.444683 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 01:23:07.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.444794 systemd[1]: Finished initrd-parse-etc.service. Sep 6 01:23:07.596567 kernel: audit: type=1130 audit(1757121787.568:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.483259 systemd[1]: Reached target initrd-fs.target. Sep 6 01:23:07.517825 systemd[1]: Reached target initrd.target. Sep 6 01:23:07.527711 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 01:23:07.534039 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 01:23:07.561120 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 01:23:07.595932 systemd[1]: Starting initrd-cleanup.service... Sep 6 01:23:07.614183 systemd[1]: Stopped target nss-lookup.target. Sep 6 01:23:07.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.621897 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 01:23:07.632018 systemd[1]: Stopped target timers.target. Sep 6 01:23:07.686553 kernel: audit: type=1131 audit(1757121787.650:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.641261 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 01:23:07.641329 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 01:23:07.672992 systemd[1]: Stopped target initrd.target. Sep 6 01:23:07.682492 systemd[1]: Stopped target basic.target. Sep 6 01:23:07.691087 systemd[1]: Stopped target ignition-complete.target. Sep 6 01:23:07.704243 systemd[1]: Stopped target ignition-diskful.target. Sep 6 01:23:07.713594 systemd[1]: Stopped target initrd-root-device.target. Sep 6 01:23:07.722470 systemd[1]: Stopped target remote-fs.target. Sep 6 01:23:07.730500 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 01:23:07.740214 systemd[1]: Stopped target sysinit.target. Sep 6 01:23:07.750119 systemd[1]: Stopped target local-fs.target. Sep 6 01:23:07.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.760087 systemd[1]: Stopped target local-fs-pre.target. Sep 6 01:23:07.769743 systemd[1]: Stopped target swap.target. Sep 6 01:23:07.821623 kernel: audit: type=1131 audit(1757121787.786:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.778358 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 01:23:07.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.778429 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 01:23:07.808293 systemd[1]: Stopped target cryptsetup.target. Sep 6 01:23:07.865445 kernel: audit: type=1131 audit(1757121787.826:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.817298 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 01:23:07.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.817358 systemd[1]: Stopped dracut-initqueue.service. Sep 6 01:23:07.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.849329 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 01:23:07.849389 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 01:23:07.861267 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 01:23:07.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.919918 ignition[1015]: INFO : Ignition 2.14.0 Sep 6 01:23:07.919918 ignition[1015]: INFO : Stage: umount Sep 6 01:23:07.919918 ignition[1015]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:23:07.919918 ignition[1015]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 6 01:23:07.919918 ignition[1015]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 6 01:23:07.919918 ignition[1015]: INFO : umount: umount passed Sep 6 01:23:07.919918 ignition[1015]: INFO : Ignition finished successfully Sep 6 01:23:07.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.861312 systemd[1]: Stopped ignition-files.service. Sep 6 01:23:08.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.870050 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 6 01:23:07.870100 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 6 01:23:07.881464 systemd[1]: Stopping ignition-mount.service... Sep 6 01:23:07.895769 systemd[1]: Stopping sysroot-boot.service... Sep 6 01:23:07.907759 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 01:23:07.907844 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 01:23:07.919456 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 01:23:08.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.919514 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 01:23:07.930236 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 01:23:07.930749 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 01:23:08.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.930837 systemd[1]: Finished initrd-cleanup.service. Sep 6 01:23:07.937929 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 01:23:07.938015 systemd[1]: Stopped ignition-mount.service. Sep 6 01:23:07.942873 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 01:23:08.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.942925 systemd[1]: Stopped ignition-disks.service. Sep 6 01:23:08.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.958173 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 01:23:08.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.958230 systemd[1]: Stopped ignition-kargs.service. Sep 6 01:23:07.979991 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 01:23:08.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.980044 systemd[1]: Stopped ignition-fetch.service. Sep 6 01:23:08.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:07.992583 systemd[1]: Stopped target network.target. Sep 6 01:23:08.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.001446 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 01:23:08.220000 audit: BPF prog-id=6 op=UNLOAD Sep 6 01:23:08.001512 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 01:23:08.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.011690 systemd[1]: Stopped target paths.target. Sep 6 01:23:08.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.019871 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 01:23:08.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.023095 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 01:23:08.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.032141 systemd[1]: Stopped target slices.target. Sep 6 01:23:08.042647 systemd[1]: Stopped target sockets.target. Sep 6 01:23:08.050725 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 01:23:08.050756 systemd[1]: Closed iscsid.socket. Sep 6 01:23:08.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.058432 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 01:23:08.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.058456 systemd[1]: Closed iscsiuio.socket. Sep 6 01:23:08.325724 kernel: hv_netvsc 000d3af9-3724-000d-3af9-3724000d3af9 eth0: Data path switched from VF: enP42795s1 Sep 6 01:23:08.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.067582 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 01:23:08.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.067634 systemd[1]: Stopped ignition-setup.service. Sep 6 01:23:08.078038 systemd[1]: Stopping systemd-networkd.service... Sep 6 01:23:08.088180 systemd[1]: Stopping systemd-resolved.service... Sep 6 01:23:08.098144 systemd-networkd[820]: eth0: DHCPv6 lease lost Sep 6 01:23:08.349000 audit: BPF prog-id=9 op=UNLOAD Sep 6 01:23:08.102571 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 01:23:08.102668 systemd[1]: Stopped systemd-networkd.service. Sep 6 01:23:08.108045 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 01:23:08.108093 systemd[1]: Closed systemd-networkd.socket. Sep 6 01:23:08.119386 systemd[1]: Stopping network-cleanup.service... Sep 6 01:23:08.135052 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 01:23:08.135160 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 01:23:08.144833 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 01:23:08.144893 systemd[1]: Stopped systemd-sysctl.service. Sep 6 01:23:08.160097 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 01:23:08.160156 systemd[1]: Stopped systemd-modules-load.service. Sep 6 01:23:08.165343 systemd[1]: Stopping systemd-udevd.service... Sep 6 01:23:08.180241 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 01:23:08.180789 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 01:23:08.180899 systemd[1]: Stopped systemd-resolved.service. Sep 6 01:23:08.190086 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 01:23:08.190219 systemd[1]: Stopped systemd-udevd.service. Sep 6 01:23:08.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:08.201122 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 01:23:08.201228 systemd[1]: Stopped sysroot-boot.service. Sep 6 01:23:08.212695 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 01:23:08.212738 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 01:23:08.221032 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 01:23:08.221083 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 01:23:08.225678 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 01:23:08.225763 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 01:23:08.236000 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 01:23:08.236052 systemd[1]: Stopped dracut-cmdline.service. Sep 6 01:23:08.513076 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Sep 6 01:23:08.244735 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 01:23:08.518776 iscsid[829]: iscsid shutting down. Sep 6 01:23:08.244785 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 01:23:08.253627 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 01:23:08.253673 systemd[1]: Stopped initrd-setup-root.service. Sep 6 01:23:08.269707 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 01:23:08.284334 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 01:23:08.284425 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 01:23:08.298432 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 01:23:08.298495 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 01:23:08.303247 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 01:23:08.303293 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 01:23:08.323258 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 01:23:08.323762 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 01:23:08.323863 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 01:23:08.435623 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 01:23:08.435727 systemd[1]: Stopped network-cleanup.service. Sep 6 01:23:08.440561 systemd[1]: Reached target initrd-switch-root.target. Sep 6 01:23:08.450055 systemd[1]: Starting initrd-switch-root.service... Sep 6 01:23:08.468290 systemd[1]: Switching root. Sep 6 01:23:08.519336 systemd-journald[276]: Journal stopped Sep 6 01:23:17.839362 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 01:23:17.839384 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 01:23:17.839395 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 01:23:17.839406 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 01:23:17.839414 kernel: SELinux: policy capability open_perms=1 Sep 6 01:23:17.839422 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 01:23:17.839431 kernel: SELinux: policy capability always_check_network=0 Sep 6 01:23:17.839440 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 01:23:17.839448 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 01:23:17.839456 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 01:23:17.839467 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 01:23:17.839479 systemd[1]: Successfully loaded SELinux policy in 242.886ms. Sep 6 01:23:17.839629 kernel: mlx5_core a72b:00:02.0: poll_health:739:(pid 0): device's health compromised - reached miss count Sep 6 01:23:17.839642 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.354ms. Sep 6 01:23:17.839655 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:23:17.839665 systemd[1]: Detected virtualization microsoft. Sep 6 01:23:17.839674 systemd[1]: Detected architecture arm64. Sep 6 01:23:17.839683 systemd[1]: Detected first boot. Sep 6 01:23:17.839692 systemd[1]: Hostname set to . Sep 6 01:23:17.839701 systemd[1]: Initializing machine ID from random generator. Sep 6 01:23:17.839710 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 01:23:17.839719 systemd[1]: Populated /etc with preset unit settings. Sep 6 01:23:17.839729 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:23:17.839739 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:23:17.839750 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:23:17.839759 kernel: kauditd_printk_skb: 48 callbacks suppressed Sep 6 01:23:17.839768 kernel: audit: type=1334 audit(1757121797.127:89): prog-id=12 op=LOAD Sep 6 01:23:17.839777 kernel: audit: type=1334 audit(1757121797.127:90): prog-id=3 op=UNLOAD Sep 6 01:23:17.839786 kernel: audit: type=1334 audit(1757121797.133:91): prog-id=13 op=LOAD Sep 6 01:23:17.839795 kernel: audit: type=1334 audit(1757121797.139:92): prog-id=14 op=LOAD Sep 6 01:23:17.839805 kernel: audit: type=1334 audit(1757121797.139:93): prog-id=4 op=UNLOAD Sep 6 01:23:17.839813 kernel: audit: type=1334 audit(1757121797.139:94): prog-id=5 op=UNLOAD Sep 6 01:23:17.839822 kernel: audit: type=1334 audit(1757121797.145:95): prog-id=15 op=LOAD Sep 6 01:23:17.839830 kernel: audit: type=1334 audit(1757121797.145:96): prog-id=12 op=UNLOAD Sep 6 01:23:17.839839 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 01:23:17.839848 kernel: audit: type=1334 audit(1757121797.150:97): prog-id=16 op=LOAD Sep 6 01:23:17.839858 systemd[1]: Stopped iscsiuio.service. Sep 6 01:23:17.839867 kernel: audit: type=1334 audit(1757121797.156:98): prog-id=17 op=LOAD Sep 6 01:23:17.839876 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 01:23:17.839886 systemd[1]: Stopped iscsid.service. Sep 6 01:23:17.839897 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 01:23:17.839907 systemd[1]: Stopped initrd-switch-root.service. Sep 6 01:23:17.839916 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 01:23:17.839926 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 01:23:17.839937 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 01:23:17.839947 systemd[1]: Created slice system-getty.slice. Sep 6 01:23:17.839956 systemd[1]: Created slice system-modprobe.slice. Sep 6 01:23:17.839966 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 01:23:17.839975 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 01:23:17.839984 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 01:23:17.839994 systemd[1]: Created slice user.slice. Sep 6 01:23:17.840004 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:23:17.840014 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 01:23:17.840025 systemd[1]: Set up automount boot.automount. Sep 6 01:23:17.840035 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 01:23:17.840044 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 01:23:17.840053 systemd[1]: Stopped target initrd-fs.target. Sep 6 01:23:17.840063 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 01:23:17.840082 systemd[1]: Reached target integritysetup.target. Sep 6 01:23:17.840092 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:23:17.840102 systemd[1]: Reached target remote-fs.target. Sep 6 01:23:17.840113 systemd[1]: Reached target slices.target. Sep 6 01:23:17.840123 systemd[1]: Reached target swap.target. Sep 6 01:23:17.840132 systemd[1]: Reached target torcx.target. Sep 6 01:23:17.840142 systemd[1]: Reached target veritysetup.target. Sep 6 01:23:17.840153 systemd[1]: Listening on systemd-coredump.socket. Sep 6 01:23:17.840163 systemd[1]: Listening on systemd-initctl.socket. Sep 6 01:23:17.840173 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:23:17.840182 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:23:17.840192 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:23:17.840201 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 01:23:17.840211 systemd[1]: Mounting dev-hugepages.mount... Sep 6 01:23:17.840222 systemd[1]: Mounting dev-mqueue.mount... Sep 6 01:23:17.840231 systemd[1]: Mounting media.mount... Sep 6 01:23:17.840242 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 01:23:17.840252 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 01:23:17.840261 systemd[1]: Mounting tmp.mount... Sep 6 01:23:17.840271 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 01:23:17.840280 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:23:17.840290 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:23:17.840299 systemd[1]: Starting modprobe@configfs.service... Sep 6 01:23:17.840309 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:23:17.840318 systemd[1]: Starting modprobe@drm.service... Sep 6 01:23:17.840329 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:23:17.840339 systemd[1]: Starting modprobe@fuse.service... Sep 6 01:23:17.840349 systemd[1]: Starting modprobe@loop.service... Sep 6 01:23:17.840359 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 01:23:17.840368 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 01:23:17.840378 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 01:23:17.840387 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 01:23:17.840397 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 01:23:17.840406 systemd[1]: Stopped systemd-journald.service. Sep 6 01:23:17.840417 systemd[1]: systemd-journald.service: Consumed 3.156s CPU time. Sep 6 01:23:17.840427 kernel: fuse: init (API version 7.34) Sep 6 01:23:17.840436 kernel: loop: module loaded Sep 6 01:23:17.840445 systemd[1]: Starting systemd-journald.service... Sep 6 01:23:17.840455 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:23:17.840464 systemd[1]: Starting systemd-network-generator.service... Sep 6 01:23:17.840474 systemd[1]: Starting systemd-remount-fs.service... Sep 6 01:23:17.840484 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:23:17.840493 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 01:23:17.840504 systemd[1]: Stopped verity-setup.service. Sep 6 01:23:17.840513 systemd[1]: Mounted dev-hugepages.mount. Sep 6 01:23:17.840528 systemd-journald[1154]: Journal started Sep 6 01:23:17.840571 systemd-journald[1154]: Runtime Journal (/run/log/journal/8af153f4a5f949e3b5760d6c21835c35) is 8.0M, max 78.5M, 70.5M free. Sep 6 01:23:10.305000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 01:23:10.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:23:10.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:23:10.999000 audit: BPF prog-id=10 op=LOAD Sep 6 01:23:10.999000 audit: BPF prog-id=10 op=UNLOAD Sep 6 01:23:10.999000 audit: BPF prog-id=11 op=LOAD Sep 6 01:23:10.999000 audit: BPF prog-id=11 op=UNLOAD Sep 6 01:23:12.068000 audit[1048]: AVC avc: denied { associate } for pid=1048 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 01:23:12.068000 audit[1048]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014588c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1031 pid=1048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:12.068000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:23:12.078000 audit[1048]: AVC avc: denied { associate } for pid=1048 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 01:23:12.078000 audit[1048]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145969 a2=1ed a3=0 items=2 ppid=1031 pid=1048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:12.078000 audit: CWD cwd="/" Sep 6 01:23:12.078000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:12.078000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:12.078000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:23:17.127000 audit: BPF prog-id=12 op=LOAD Sep 6 01:23:17.127000 audit: BPF prog-id=3 op=UNLOAD Sep 6 01:23:17.133000 audit: BPF prog-id=13 op=LOAD Sep 6 01:23:17.139000 audit: BPF prog-id=14 op=LOAD Sep 6 01:23:17.139000 audit: BPF prog-id=4 op=UNLOAD Sep 6 01:23:17.139000 audit: BPF prog-id=5 op=UNLOAD Sep 6 01:23:17.145000 audit: BPF prog-id=15 op=LOAD Sep 6 01:23:17.145000 audit: BPF prog-id=12 op=UNLOAD Sep 6 01:23:17.150000 audit: BPF prog-id=16 op=LOAD Sep 6 01:23:17.156000 audit: BPF prog-id=17 op=LOAD Sep 6 01:23:17.156000 audit: BPF prog-id=13 op=UNLOAD Sep 6 01:23:17.156000 audit: BPF prog-id=14 op=UNLOAD Sep 6 01:23:17.162000 audit: BPF prog-id=18 op=LOAD Sep 6 01:23:17.162000 audit: BPF prog-id=15 op=UNLOAD Sep 6 01:23:17.168000 audit: BPF prog-id=19 op=LOAD Sep 6 01:23:17.174000 audit: BPF prog-id=20 op=LOAD Sep 6 01:23:17.174000 audit: BPF prog-id=16 op=UNLOAD Sep 6 01:23:17.174000 audit: BPF prog-id=17 op=UNLOAD Sep 6 01:23:17.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.203000 audit: BPF prog-id=18 op=UNLOAD Sep 6 01:23:17.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.747000 audit: BPF prog-id=21 op=LOAD Sep 6 01:23:17.747000 audit: BPF prog-id=22 op=LOAD Sep 6 01:23:17.747000 audit: BPF prog-id=23 op=LOAD Sep 6 01:23:17.747000 audit: BPF prog-id=19 op=UNLOAD Sep 6 01:23:17.747000 audit: BPF prog-id=20 op=UNLOAD Sep 6 01:23:17.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.834000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 01:23:17.834000 audit[1154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffcf10ca70 a2=4000 a3=1 items=0 ppid=1 pid=1154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:17.834000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 01:23:17.125746 systemd[1]: Queued start job for default target multi-user.target. Sep 6 01:23:12.016610 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:23:17.125759 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 6 01:23:12.016873 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:23:17.175370 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 01:23:12.016898 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:23:17.175780 systemd[1]: systemd-journald.service: Consumed 3.156s CPU time. Sep 6 01:23:12.016935 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 01:23:12.016945 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 01:23:12.016974 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 01:23:12.016986 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 01:23:12.017209 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 01:23:12.017243 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:23:12.017255 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:23:12.053663 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 01:23:12.053722 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 01:23:12.053746 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 01:23:12.053761 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 01:23:12.053782 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 01:23:12.053796 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 01:23:16.248029 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:23:16.248339 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:23:16.248449 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:23:16.248610 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:23:16.248661 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 01:23:16.248719 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-09-06T01:23:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 01:23:17.855442 systemd[1]: Started systemd-journald.service. Sep 6 01:23:17.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.853471 systemd[1]: Mounted dev-mqueue.mount. Sep 6 01:23:17.857767 systemd[1]: Mounted media.mount. Sep 6 01:23:17.861712 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 01:23:17.866269 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 01:23:17.870891 systemd[1]: Mounted tmp.mount. Sep 6 01:23:17.875415 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 01:23:17.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.880717 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:23:17.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.885864 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 01:23:17.886313 systemd[1]: Finished modprobe@configfs.service. Sep 6 01:23:17.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.891414 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:23:17.891591 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:23:17.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.896394 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:23:17.896517 systemd[1]: Finished modprobe@drm.service. Sep 6 01:23:17.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.901264 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:23:17.901390 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:23:17.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.906883 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 01:23:17.907018 systemd[1]: Finished modprobe@fuse.service. Sep 6 01:23:17.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.911900 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:23:17.912063 systemd[1]: Finished modprobe@loop.service. Sep 6 01:23:17.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.917110 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:23:17.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.922593 systemd[1]: Finished systemd-network-generator.service. Sep 6 01:23:17.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.928545 systemd[1]: Finished systemd-remount-fs.service. Sep 6 01:23:17.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.934737 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:23:17.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:17.940872 systemd[1]: Reached target network-pre.target. Sep 6 01:23:17.946899 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 01:23:17.953548 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 01:23:17.958533 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 01:23:17.960607 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 01:23:17.967504 systemd[1]: Starting systemd-journal-flush.service... Sep 6 01:23:17.973000 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:23:17.974728 systemd[1]: Starting systemd-random-seed.service... Sep 6 01:23:17.979945 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:23:17.981320 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:23:17.986832 systemd[1]: Starting systemd-sysusers.service... Sep 6 01:23:17.992637 systemd[1]: Starting systemd-udev-settle.service... Sep 6 01:23:18.000959 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 01:23:18.006289 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 01:23:18.015095 udevadm[1168]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 6 01:23:18.028992 systemd-journald[1154]: Time spent on flushing to /var/log/journal/8af153f4a5f949e3b5760d6c21835c35 is 14.184ms for 1079 entries. Sep 6 01:23:18.028992 systemd-journald[1154]: System Journal (/var/log/journal/8af153f4a5f949e3b5760d6c21835c35) is 8.0M, max 2.6G, 2.6G free. Sep 6 01:23:18.095574 systemd-journald[1154]: Received client request to flush runtime journal. Sep 6 01:23:18.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:18.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:18.050300 systemd[1]: Finished systemd-random-seed.service. Sep 6 01:23:18.056088 systemd[1]: Reached target first-boot-complete.target. Sep 6 01:23:18.077153 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:23:18.096607 systemd[1]: Finished systemd-journal-flush.service. Sep 6 01:23:18.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:18.492535 systemd[1]: Finished systemd-sysusers.service. Sep 6 01:23:18.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:18.498587 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:23:18.869610 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:23:18.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.006288 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 01:23:19.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.012000 audit: BPF prog-id=24 op=LOAD Sep 6 01:23:19.012000 audit: BPF prog-id=25 op=LOAD Sep 6 01:23:19.012000 audit: BPF prog-id=7 op=UNLOAD Sep 6 01:23:19.012000 audit: BPF prog-id=8 op=UNLOAD Sep 6 01:23:19.013063 systemd[1]: Starting systemd-udevd.service... Sep 6 01:23:19.032991 systemd-udevd[1173]: Using default interface naming scheme 'v252'. Sep 6 01:23:19.161277 systemd[1]: Started systemd-udevd.service. Sep 6 01:23:19.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.173000 audit: BPF prog-id=26 op=LOAD Sep 6 01:23:19.173943 systemd[1]: Starting systemd-networkd.service... Sep 6 01:23:19.212700 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Sep 6 01:23:19.248102 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 01:23:19.249128 systemd[1]: Starting systemd-userdbd.service... Sep 6 01:23:19.248000 audit: BPF prog-id=27 op=LOAD Sep 6 01:23:19.248000 audit: BPF prog-id=28 op=LOAD Sep 6 01:23:19.248000 audit: BPF prog-id=29 op=LOAD Sep 6 01:23:19.292000 audit[1174]: AVC avc: denied { confidentiality } for pid=1174 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 01:23:19.318451 kernel: hv_vmbus: registering driver hv_balloon Sep 6 01:23:19.318540 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 6 01:23:19.318556 kernel: hv_balloon: Memory hot add disabled on ARM64 Sep 6 01:23:19.292000 audit[1174]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0cffa6d0 a1=aa2c a2=ffffb5fb24b0 a3=aaab0cf5c010 items=12 ppid=1173 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:19.292000 audit: CWD cwd="/" Sep 6 01:23:19.292000 audit: PATH item=0 name=(null) inode=6886 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=1 name=(null) inode=8995 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=2 name=(null) inode=8995 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=3 name=(null) inode=8996 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=4 name=(null) inode=8995 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=5 name=(null) inode=8997 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=6 name=(null) inode=8995 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=7 name=(null) inode=8998 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=8 name=(null) inode=8995 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=9 name=(null) inode=8999 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=10 name=(null) inode=8995 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PATH item=11 name=(null) inode=9000 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:23:19.292000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 01:23:19.336102 kernel: hv_vmbus: registering driver hyperv_fb Sep 6 01:23:19.336196 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 6 01:23:19.326953 systemd[1]: Started systemd-userdbd.service. Sep 6 01:23:19.344863 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 6 01:23:19.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.353827 kernel: Console: switching to colour dummy device 80x25 Sep 6 01:23:19.364895 kernel: hv_utils: Registering HyperV Utility Driver Sep 6 01:23:19.364973 kernel: Console: switching to colour frame buffer device 128x48 Sep 6 01:23:19.376670 kernel: hv_vmbus: registering driver hv_utils Sep 6 01:23:19.387475 kernel: hv_utils: Heartbeat IC version 3.0 Sep 6 01:23:19.387560 kernel: hv_utils: Shutdown IC version 3.2 Sep 6 01:23:19.387602 kernel: hv_utils: TimeSync IC version 4.0 Sep 6 01:23:19.809197 systemd-networkd[1194]: lo: Link UP Sep 6 01:23:19.809605 systemd-networkd[1194]: lo: Gained carrier Sep 6 01:23:19.810346 systemd-networkd[1194]: Enumeration completed Sep 6 01:23:19.810649 systemd[1]: Started systemd-networkd.service. Sep 6 01:23:19.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.819137 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 01:23:19.838761 systemd-networkd[1194]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:23:19.856028 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:23:19.867544 systemd[1]: Finished systemd-udev-settle.service. Sep 6 01:23:19.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.875605 systemd[1]: Starting lvm2-activation-early.service... Sep 6 01:23:19.900996 kernel: mlx5_core a72b:00:02.0 enP42795s1: Link up Sep 6 01:23:19.948016 kernel: hv_netvsc 000d3af9-3724-000d-3af9-3724000d3af9 eth0: Data path switched to VF: enP42795s1 Sep 6 01:23:19.948969 systemd-networkd[1194]: enP42795s1: Link UP Sep 6 01:23:19.949120 systemd-networkd[1194]: eth0: Link UP Sep 6 01:23:19.949123 systemd-networkd[1194]: eth0: Gained carrier Sep 6 01:23:19.954411 systemd-networkd[1194]: enP42795s1: Gained carrier Sep 6 01:23:19.962169 systemd-networkd[1194]: eth0: DHCPv4 address 10.200.20.40/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 6 01:23:20.123915 lvm[1251]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:23:20.163110 systemd[1]: Finished lvm2-activation-early.service. Sep 6 01:23:20.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.168359 systemd[1]: Reached target cryptsetup.target. Sep 6 01:23:20.174235 systemd[1]: Starting lvm2-activation.service... Sep 6 01:23:20.178261 lvm[1252]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:23:20.207947 systemd[1]: Finished lvm2-activation.service. Sep 6 01:23:20.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.212604 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:23:20.217337 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 01:23:20.217368 systemd[1]: Reached target local-fs.target. Sep 6 01:23:20.223197 systemd[1]: Reached target machines.target. Sep 6 01:23:20.229349 systemd[1]: Starting ldconfig.service... Sep 6 01:23:20.233248 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:23:20.233323 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:23:20.234638 systemd[1]: Starting systemd-boot-update.service... Sep 6 01:23:20.240329 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 01:23:20.247325 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 01:23:20.253710 systemd[1]: Starting systemd-sysext.service... Sep 6 01:23:20.304955 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1254 (bootctl) Sep 6 01:23:20.306415 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 01:23:20.609658 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 01:23:20.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.623307 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 01:23:20.671418 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 01:23:20.671611 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 01:23:20.717011 kernel: loop0: detected capacity change from 0 to 211168 Sep 6 01:23:20.734952 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 01:23:20.735587 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 01:23:20.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.775010 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 01:23:20.804341 systemd-fsck[1261]: fsck.fat 4.2 (2021-01-31) Sep 6 01:23:20.804341 systemd-fsck[1261]: /dev/sda1: 236 files, 117310/258078 clusters Sep 6 01:23:20.807086 kernel: loop1: detected capacity change from 0 to 211168 Sep 6 01:23:20.808231 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 01:23:20.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.817743 systemd[1]: Mounting boot.mount... Sep 6 01:23:20.825198 (sd-sysext)[1266]: Using extensions 'kubernetes'. Sep 6 01:23:20.825582 (sd-sysext)[1266]: Merged extensions into '/usr'. Sep 6 01:23:20.841370 systemd[1]: Mounted boot.mount. Sep 6 01:23:20.853139 systemd[1]: Mounting usr-share-oem.mount... Sep 6 01:23:20.857549 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:23:20.859197 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:23:20.865845 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:23:20.872161 systemd[1]: Starting modprobe@loop.service... Sep 6 01:23:20.876825 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:23:20.877078 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:23:20.880612 systemd[1]: Finished systemd-boot-update.service. Sep 6 01:23:20.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.886748 systemd[1]: Mounted usr-share-oem.mount. Sep 6 01:23:20.892898 systemd[1]: Finished systemd-sysext.service. Sep 6 01:23:20.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.898237 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:23:20.898380 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:23:20.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.904342 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:23:20.904473 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:23:20.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.910471 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:23:20.910597 systemd[1]: Finished modprobe@loop.service. Sep 6 01:23:20.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.918183 systemd[1]: Starting ensure-sysext.service... Sep 6 01:23:20.922632 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:23:20.922712 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:23:20.924036 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 01:23:20.934931 systemd[1]: Reloading. Sep 6 01:23:20.950460 systemd-tmpfiles[1277]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 01:23:20.979927 systemd-tmpfiles[1277]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 01:23:20.989944 /usr/lib/systemd/system-generators/torcx-generator[1297]: time="2025-09-06T01:23:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:23:20.989991 /usr/lib/systemd/system-generators/torcx-generator[1297]: time="2025-09-06T01:23:20Z" level=info msg="torcx already run" Sep 6 01:23:20.998841 systemd-tmpfiles[1277]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 01:23:21.066136 systemd-networkd[1194]: eth0: Gained IPv6LL Sep 6 01:23:21.081655 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:23:21.081676 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:23:21.097668 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:23:21.160000 audit: BPF prog-id=30 op=LOAD Sep 6 01:23:21.160000 audit: BPF prog-id=21 op=UNLOAD Sep 6 01:23:21.160000 audit: BPF prog-id=31 op=LOAD Sep 6 01:23:21.160000 audit: BPF prog-id=32 op=LOAD Sep 6 01:23:21.160000 audit: BPF prog-id=22 op=UNLOAD Sep 6 01:23:21.160000 audit: BPF prog-id=23 op=UNLOAD Sep 6 01:23:21.163000 audit: BPF prog-id=33 op=LOAD Sep 6 01:23:21.163000 audit: BPF prog-id=34 op=LOAD Sep 6 01:23:21.163000 audit: BPF prog-id=24 op=UNLOAD Sep 6 01:23:21.163000 audit: BPF prog-id=25 op=UNLOAD Sep 6 01:23:21.164000 audit: BPF prog-id=35 op=LOAD Sep 6 01:23:21.164000 audit: BPF prog-id=26 op=UNLOAD Sep 6 01:23:21.165000 audit: BPF prog-id=36 op=LOAD Sep 6 01:23:21.165000 audit: BPF prog-id=27 op=UNLOAD Sep 6 01:23:21.165000 audit: BPF prog-id=37 op=LOAD Sep 6 01:23:21.165000 audit: BPF prog-id=38 op=LOAD Sep 6 01:23:21.165000 audit: BPF prog-id=28 op=UNLOAD Sep 6 01:23:21.165000 audit: BPF prog-id=29 op=UNLOAD Sep 6 01:23:21.168523 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 01:23:21.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.183340 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:23:21.184810 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:23:21.191121 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:23:21.197328 systemd[1]: Starting modprobe@loop.service... Sep 6 01:23:21.201603 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:23:21.201739 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:23:21.202580 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:23:21.202907 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:23:21.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.208506 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:23:21.208644 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:23:21.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.214227 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:23:21.214362 systemd[1]: Finished modprobe@loop.service. Sep 6 01:23:21.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.221053 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:23:21.222583 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:23:21.228217 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:23:21.234275 systemd[1]: Starting modprobe@loop.service... Sep 6 01:23:21.238685 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:23:21.238825 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:23:21.239721 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:23:21.239887 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:23:21.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.245140 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:23:21.245280 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:23:21.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.250533 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:23:21.250666 systemd[1]: Finished modprobe@loop.service. Sep 6 01:23:21.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.258042 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:23:21.259479 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:23:21.265108 systemd[1]: Starting modprobe@drm.service... Sep 6 01:23:21.272386 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:23:21.278106 systemd[1]: Starting modprobe@loop.service... Sep 6 01:23:21.282056 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:23:21.282210 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:23:21.283441 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:23:21.283614 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:23:21.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.289534 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:23:21.289682 systemd[1]: Finished modprobe@drm.service. Sep 6 01:23:21.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.294777 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:23:21.294915 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:23:21.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.300496 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:23:21.300634 systemd[1]: Finished modprobe@loop.service. Sep 6 01:23:21.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.306413 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:23:21.306490 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:23:21.307593 systemd[1]: Finished ensure-sysext.service. Sep 6 01:23:21.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.474673 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 01:23:21.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.481303 systemd[1]: Starting audit-rules.service... Sep 6 01:23:21.486681 systemd[1]: Starting clean-ca-certificates.service... Sep 6 01:23:21.492750 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 01:23:21.501000 audit: BPF prog-id=39 op=LOAD Sep 6 01:23:21.503491 systemd[1]: Starting systemd-resolved.service... Sep 6 01:23:21.508000 audit: BPF prog-id=40 op=LOAD Sep 6 01:23:21.510805 systemd[1]: Starting systemd-timesyncd.service... Sep 6 01:23:21.516740 systemd[1]: Starting systemd-update-utmp.service... Sep 6 01:23:21.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.540811 systemd[1]: Finished clean-ca-certificates.service. Sep 6 01:23:21.546081 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:23:21.558000 audit[1373]: SYSTEM_BOOT pid=1373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.561685 systemd[1]: Finished systemd-update-utmp.service. Sep 6 01:23:21.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.611005 systemd[1]: Started systemd-timesyncd.service. Sep 6 01:23:21.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.616179 systemd[1]: Reached target time-set.target. Sep 6 01:23:21.670626 systemd-resolved[1371]: Positive Trust Anchors: Sep 6 01:23:21.670932 systemd-resolved[1371]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:23:21.671028 systemd-resolved[1371]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:23:21.697493 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 01:23:21.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.711972 systemd-resolved[1371]: Using system hostname 'ci-3510.3.8-n-95263eb338'. Sep 6 01:23:21.713853 systemd[1]: Started systemd-resolved.service. Sep 6 01:23:21.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.719250 systemd[1]: Reached target network.target. Sep 6 01:23:21.723534 systemd[1]: Reached target network-online.target. Sep 6 01:23:21.729081 systemd[1]: Reached target nss-lookup.target. Sep 6 01:23:21.861000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 01:23:21.861000 audit[1388]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff15d79d0 a2=420 a3=0 items=0 ppid=1367 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:21.861000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 01:23:21.875049 augenrules[1388]: No rules Sep 6 01:23:21.876026 systemd[1]: Finished audit-rules.service. Sep 6 01:23:21.886960 systemd-timesyncd[1372]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Sep 6 01:23:21.887045 systemd-timesyncd[1372]: Initial clock synchronization to Sat 2025-09-06 01:23:21.888303 UTC. Sep 6 01:23:26.888853 ldconfig[1253]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 01:23:26.905396 systemd[1]: Finished ldconfig.service. Sep 6 01:23:26.911425 systemd[1]: Starting systemd-update-done.service... Sep 6 01:23:26.945619 systemd[1]: Finished systemd-update-done.service. Sep 6 01:23:26.950758 systemd[1]: Reached target sysinit.target. Sep 6 01:23:26.955412 systemd[1]: Started motdgen.path. Sep 6 01:23:26.959373 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 01:23:26.965547 systemd[1]: Started logrotate.timer. Sep 6 01:23:26.969419 systemd[1]: Started mdadm.timer. Sep 6 01:23:26.973430 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 01:23:26.978092 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 01:23:26.978134 systemd[1]: Reached target paths.target. Sep 6 01:23:26.982171 systemd[1]: Reached target timers.target. Sep 6 01:23:26.986715 systemd[1]: Listening on dbus.socket. Sep 6 01:23:26.991875 systemd[1]: Starting docker.socket... Sep 6 01:23:26.998328 systemd[1]: Listening on sshd.socket. Sep 6 01:23:27.002498 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:23:27.003152 systemd[1]: Listening on docker.socket. Sep 6 01:23:27.007668 systemd[1]: Reached target sockets.target. Sep 6 01:23:27.011819 systemd[1]: Reached target basic.target. Sep 6 01:23:27.015915 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:23:27.015949 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:23:27.017324 systemd[1]: Starting containerd.service... Sep 6 01:23:27.022548 systemd[1]: Starting dbus.service... Sep 6 01:23:27.027110 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 01:23:27.032635 systemd[1]: Starting extend-filesystems.service... Sep 6 01:23:27.036887 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 01:23:27.038652 systemd[1]: Starting kubelet.service... Sep 6 01:23:27.043595 systemd[1]: Starting motdgen.service... Sep 6 01:23:27.048371 systemd[1]: Started nvidia.service. Sep 6 01:23:27.056333 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 01:23:27.065187 systemd[1]: Starting sshd-keygen.service... Sep 6 01:23:27.072910 systemd[1]: Starting systemd-logind.service... Sep 6 01:23:27.077872 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:23:27.077950 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 01:23:27.078497 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 01:23:27.079629 systemd[1]: Starting update-engine.service... Sep 6 01:23:27.085161 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 01:23:27.093128 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 01:23:27.093315 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 01:23:27.099919 jq[1398]: false Sep 6 01:23:27.102794 jq[1415]: true Sep 6 01:23:27.116803 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 01:23:27.116998 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 01:23:27.134911 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 01:23:27.135130 systemd[1]: Finished motdgen.service. Sep 6 01:23:27.155220 jq[1419]: true Sep 6 01:23:27.181477 systemd-logind[1409]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Sep 6 01:23:27.183292 systemd-logind[1409]: New seat seat0. Sep 6 01:23:27.188108 extend-filesystems[1399]: Found loop1 Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda1 Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda2 Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda3 Sep 6 01:23:27.193304 extend-filesystems[1399]: Found usr Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda4 Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda6 Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda7 Sep 6 01:23:27.193304 extend-filesystems[1399]: Found sda9 Sep 6 01:23:27.193304 extend-filesystems[1399]: Checking size of /dev/sda9 Sep 6 01:23:27.256618 env[1420]: time="2025-09-06T01:23:27.241884922Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 01:23:27.279391 extend-filesystems[1399]: Old size kept for /dev/sda9 Sep 6 01:23:27.289522 extend-filesystems[1399]: Found sr0 Sep 6 01:23:27.289136 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 01:23:27.315370 dbus-daemon[1397]: [system] SELinux support is enabled Sep 6 01:23:27.289335 systemd[1]: Finished extend-filesystems.service. Sep 6 01:23:27.315551 systemd[1]: Started dbus.service. Sep 6 01:23:27.324674 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 01:23:27.327465 env[1420]: time="2025-09-06T01:23:27.326913998Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 01:23:27.327465 env[1420]: time="2025-09-06T01:23:27.327109091Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:23:27.324709 systemd[1]: Reached target system-config.target. Sep 6 01:23:27.329391 bash[1447]: Updated "/home/core/.ssh/authorized_keys" Sep 6 01:23:27.329790 env[1420]: time="2025-09-06T01:23:27.329698541Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:23:27.329882 env[1420]: time="2025-09-06T01:23:27.329866593Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:23:27.330226 env[1420]: time="2025-09-06T01:23:27.330196134Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:23:27.330323 env[1420]: time="2025-09-06T01:23:27.330306781Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 01:23:27.330441 env[1420]: time="2025-09-06T01:23:27.330377426Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 01:23:27.330532 env[1420]: time="2025-09-06T01:23:27.330494594Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 01:23:27.330793 env[1420]: time="2025-09-06T01:23:27.330771052Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:23:27.331614 env[1420]: time="2025-09-06T01:23:27.331585586Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:23:27.331911 env[1420]: time="2025-09-06T01:23:27.331886565Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:23:27.332022 env[1420]: time="2025-09-06T01:23:27.332004853Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 01:23:27.332149 env[1420]: time="2025-09-06T01:23:27.332130982Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 01:23:27.332214 env[1420]: time="2025-09-06T01:23:27.332200426Z" level=info msg="metadata content store policy set" policy=shared Sep 6 01:23:27.332625 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 01:23:27.332656 systemd[1]: Reached target user-config.target. Sep 6 01:23:27.339652 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 01:23:27.345484 systemd[1]: nvidia.service: Deactivated successfully. Sep 6 01:23:27.346630 dbus-daemon[1397]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 6 01:23:27.349131 systemd[1]: Started systemd-logind.service. Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368056386Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368109469Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368123270Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368167353Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368206636Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368278961Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368295442Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368705989Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368728110Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368742551Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368756272Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368769273Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.368922843Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 01:23:27.370039 env[1420]: time="2025-09-06T01:23:27.369047771Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369341830Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369380033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369394834Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369444237Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369457438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369469279Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369482480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369548564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369562765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369573886Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369585206Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369606408Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369759298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369780659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370417 env[1420]: time="2025-09-06T01:23:27.369795900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.370690 env[1420]: time="2025-09-06T01:23:27.369808181Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 01:23:27.370690 env[1420]: time="2025-09-06T01:23:27.369824062Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 01:23:27.370690 env[1420]: time="2025-09-06T01:23:27.369835103Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 01:23:27.370690 env[1420]: time="2025-09-06T01:23:27.369853664Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 01:23:27.370690 env[1420]: time="2025-09-06T01:23:27.369888706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 01:23:27.371467 env[1420]: time="2025-09-06T01:23:27.370951216Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 01:23:27.371467 env[1420]: time="2025-09-06T01:23:27.371047823Z" level=info msg="Connect containerd service" Sep 6 01:23:27.371467 env[1420]: time="2025-09-06T01:23:27.371089425Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.372066370Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.372356229Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.372394071Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.372455555Z" level=info msg="containerd successfully booted in 0.139405s" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.378309021Z" level=info msg="Start subscribing containerd event" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.378401747Z" level=info msg="Start recovering state" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.378488832Z" level=info msg="Start event monitor" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.378514914Z" level=info msg="Start snapshots syncer" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.378526555Z" level=info msg="Start cni network conf syncer for default" Sep 6 01:23:27.387756 env[1420]: time="2025-09-06T01:23:27.378538196Z" level=info msg="Start streaming server" Sep 6 01:23:27.372525 systemd[1]: Started containerd.service. Sep 6 01:23:27.693136 update_engine[1414]: I0906 01:23:27.681353 1414 main.cc:92] Flatcar Update Engine starting Sep 6 01:23:27.741826 systemd[1]: Started update-engine.service. Sep 6 01:23:27.742183 update_engine[1414]: I0906 01:23:27.741883 1414 update_check_scheduler.cc:74] Next update check in 9m6s Sep 6 01:23:27.750945 systemd[1]: Started locksmithd.service. Sep 6 01:23:28.084431 systemd[1]: Started kubelet.service. Sep 6 01:23:28.545155 kubelet[1497]: E0906 01:23:28.544945 1497 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:28.547871 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:28.548036 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:28.561596 sshd_keygen[1412]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 01:23:28.581512 systemd[1]: Finished sshd-keygen.service. Sep 6 01:23:28.587807 systemd[1]: Starting issuegen.service... Sep 6 01:23:28.593080 systemd[1]: Started waagent.service. Sep 6 01:23:28.597714 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 01:23:28.597908 systemd[1]: Finished issuegen.service. Sep 6 01:23:28.603785 systemd[1]: Starting systemd-user-sessions.service... Sep 6 01:23:28.638212 systemd[1]: Finished systemd-user-sessions.service. Sep 6 01:23:28.644672 systemd[1]: Started getty@tty1.service. Sep 6 01:23:28.650941 systemd[1]: Started serial-getty@ttyAMA0.service. Sep 6 01:23:28.656298 systemd[1]: Reached target getty.target. Sep 6 01:23:28.660567 systemd[1]: Reached target multi-user.target. Sep 6 01:23:28.666806 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 01:23:28.680944 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 01:23:28.681157 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 01:23:28.686929 systemd[1]: Startup finished in 760ms (kernel) + 12.244s (initrd) + 18.582s (userspace) = 31.587s. Sep 6 01:23:28.890927 locksmithd[1494]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 01:23:29.393836 login[1519]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Sep 6 01:23:29.395711 login[1520]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 6 01:23:29.450717 systemd[1]: Created slice user-500.slice. Sep 6 01:23:29.451951 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 01:23:29.454366 systemd-logind[1409]: New session 2 of user core. Sep 6 01:23:29.490600 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 01:23:29.492582 systemd[1]: Starting user@500.service... Sep 6 01:23:29.523037 (systemd)[1524]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:29.681380 systemd[1524]: Queued start job for default target default.target. Sep 6 01:23:29.682092 systemd[1524]: Reached target paths.target. Sep 6 01:23:29.682113 systemd[1524]: Reached target sockets.target. Sep 6 01:23:29.682125 systemd[1524]: Reached target timers.target. Sep 6 01:23:29.682135 systemd[1524]: Reached target basic.target. Sep 6 01:23:29.682247 systemd[1]: Started user@500.service. Sep 6 01:23:29.683201 systemd[1]: Started session-2.scope. Sep 6 01:23:29.683615 systemd[1524]: Reached target default.target. Sep 6 01:23:29.683788 systemd[1524]: Startup finished in 154ms. Sep 6 01:23:30.394211 login[1519]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 6 01:23:30.399197 systemd[1]: Started session-1.scope. Sep 6 01:23:30.399556 systemd-logind[1409]: New session 1 of user core. Sep 6 01:23:34.540194 waagent[1515]: 2025-09-06T01:23:34.540064Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 6 01:23:34.547283 waagent[1515]: 2025-09-06T01:23:34.547178Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 6 01:23:34.552104 waagent[1515]: 2025-09-06T01:23:34.552016Z INFO Daemon Daemon Python: 3.9.16 Sep 6 01:23:34.556944 waagent[1515]: 2025-09-06T01:23:34.556853Z INFO Daemon Daemon Run daemon Sep 6 01:23:34.561447 waagent[1515]: 2025-09-06T01:23:34.561369Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 6 01:23:34.579829 waagent[1515]: 2025-09-06T01:23:34.579656Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 6 01:23:34.602043 waagent[1515]: 2025-09-06T01:23:34.601853Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 6 01:23:34.613518 waagent[1515]: 2025-09-06T01:23:34.613422Z INFO Daemon Daemon cloud-init is enabled: False Sep 6 01:23:34.619458 waagent[1515]: 2025-09-06T01:23:34.619366Z INFO Daemon Daemon Using waagent for provisioning Sep 6 01:23:34.625939 waagent[1515]: 2025-09-06T01:23:34.625858Z INFO Daemon Daemon Activate resource disk Sep 6 01:23:34.631434 waagent[1515]: 2025-09-06T01:23:34.631344Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 6 01:23:34.646969 waagent[1515]: 2025-09-06T01:23:34.646871Z INFO Daemon Daemon Found device: None Sep 6 01:23:34.652834 waagent[1515]: 2025-09-06T01:23:34.652739Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 6 01:23:34.662227 waagent[1515]: 2025-09-06T01:23:34.662143Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 6 01:23:34.675043 waagent[1515]: 2025-09-06T01:23:34.674950Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 6 01:23:34.681123 waagent[1515]: 2025-09-06T01:23:34.681036Z INFO Daemon Daemon Running default provisioning handler Sep 6 01:23:34.695216 waagent[1515]: 2025-09-06T01:23:34.695047Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 6 01:23:34.711315 waagent[1515]: 2025-09-06T01:23:34.711153Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 6 01:23:34.721766 waagent[1515]: 2025-09-06T01:23:34.721671Z INFO Daemon Daemon cloud-init is enabled: False Sep 6 01:23:34.727682 waagent[1515]: 2025-09-06T01:23:34.727592Z INFO Daemon Daemon Copying ovf-env.xml Sep 6 01:23:34.818464 waagent[1515]: 2025-09-06T01:23:34.818242Z INFO Daemon Daemon Successfully mounted dvd Sep 6 01:23:34.891907 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 6 01:23:34.929164 waagent[1515]: 2025-09-06T01:23:34.928968Z INFO Daemon Daemon Detect protocol endpoint Sep 6 01:23:34.934485 waagent[1515]: 2025-09-06T01:23:34.934351Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 6 01:23:34.941222 waagent[1515]: 2025-09-06T01:23:34.941130Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 6 01:23:34.948619 waagent[1515]: 2025-09-06T01:23:34.948528Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 6 01:23:34.955524 waagent[1515]: 2025-09-06T01:23:34.955310Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 6 01:23:34.962032 waagent[1515]: 2025-09-06T01:23:34.961894Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 6 01:23:35.076095 waagent[1515]: 2025-09-06T01:23:35.075933Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 6 01:23:35.083528 waagent[1515]: 2025-09-06T01:23:35.083481Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 6 01:23:35.089352 waagent[1515]: 2025-09-06T01:23:35.089267Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 6 01:23:35.559000 waagent[1515]: 2025-09-06T01:23:35.558814Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 6 01:23:35.575262 waagent[1515]: 2025-09-06T01:23:35.575154Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 6 01:23:35.581295 waagent[1515]: 2025-09-06T01:23:35.581203Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 6 01:23:35.737696 waagent[1515]: 2025-09-06T01:23:35.737531Z INFO Daemon Daemon Found private key matching thumbprint 389FA42E1C5A463E3A9F81FE436FB7DF92673A69 Sep 6 01:23:35.746847 waagent[1515]: 2025-09-06T01:23:35.746753Z INFO Daemon Daemon Fetch goal state completed Sep 6 01:23:35.802290 waagent[1515]: 2025-09-06T01:23:35.802228Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: bcac8cd7-403e-47f3-876b-097d5b5cf653 New eTag: 9421246261404978332] Sep 6 01:23:35.815352 waagent[1515]: 2025-09-06T01:23:35.815187Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 6 01:23:35.867132 waagent[1515]: 2025-09-06T01:23:35.867036Z INFO Daemon Daemon Starting provisioning Sep 6 01:23:35.873134 waagent[1515]: 2025-09-06T01:23:35.873011Z INFO Daemon Daemon Handle ovf-env.xml. Sep 6 01:23:35.879296 waagent[1515]: 2025-09-06T01:23:35.879184Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-95263eb338] Sep 6 01:23:35.939931 waagent[1515]: 2025-09-06T01:23:35.939735Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-95263eb338] Sep 6 01:23:35.948214 waagent[1515]: 2025-09-06T01:23:35.948092Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 6 01:23:35.956393 waagent[1515]: 2025-09-06T01:23:35.956293Z INFO Daemon Daemon Primary interface is [eth0] Sep 6 01:23:35.978213 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 6 01:23:35.978465 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 6 01:23:35.978536 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 6 01:23:35.978895 systemd[1]: Stopping systemd-networkd.service... Sep 6 01:23:35.983072 systemd-networkd[1194]: eth0: DHCPv6 lease lost Sep 6 01:23:35.988637 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 01:23:35.988892 systemd[1]: Stopped systemd-networkd.service. Sep 6 01:23:35.991659 systemd[1]: Starting systemd-networkd.service... Sep 6 01:23:36.028911 systemd-networkd[1566]: enP42795s1: Link UP Sep 6 01:23:36.028923 systemd-networkd[1566]: enP42795s1: Gained carrier Sep 6 01:23:36.030340 systemd-networkd[1566]: eth0: Link UP Sep 6 01:23:36.030352 systemd-networkd[1566]: eth0: Gained carrier Sep 6 01:23:36.030744 systemd-networkd[1566]: lo: Link UP Sep 6 01:23:36.030754 systemd-networkd[1566]: lo: Gained carrier Sep 6 01:23:36.031030 systemd-networkd[1566]: eth0: Gained IPv6LL Sep 6 01:23:36.031502 systemd-networkd[1566]: Enumeration completed Sep 6 01:23:36.031625 systemd[1]: Started systemd-networkd.service. Sep 6 01:23:36.033576 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 01:23:36.034104 waagent[1515]: 2025-09-06T01:23:36.033436Z INFO Daemon Daemon Create user account if not exists Sep 6 01:23:36.040402 waagent[1515]: 2025-09-06T01:23:36.040306Z INFO Daemon Daemon User core already exists, skip useradd Sep 6 01:23:36.047321 waagent[1515]: 2025-09-06T01:23:36.047211Z INFO Daemon Daemon Configure sudoer Sep 6 01:23:36.048136 systemd-networkd[1566]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:23:36.052840 waagent[1515]: 2025-09-06T01:23:36.052745Z INFO Daemon Daemon Configure sshd Sep 6 01:23:36.057424 waagent[1515]: 2025-09-06T01:23:36.057319Z INFO Daemon Daemon Deploy ssh public key. Sep 6 01:23:36.075063 systemd-networkd[1566]: eth0: DHCPv4 address 10.200.20.40/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 6 01:23:36.079892 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 01:23:37.261082 waagent[1515]: 2025-09-06T01:23:37.260968Z INFO Daemon Daemon Provisioning complete Sep 6 01:23:37.279897 waagent[1515]: 2025-09-06T01:23:37.279823Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 6 01:23:37.286603 waagent[1515]: 2025-09-06T01:23:37.286497Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 6 01:23:37.297793 waagent[1515]: 2025-09-06T01:23:37.297698Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 6 01:23:37.630451 waagent[1572]: 2025-09-06T01:23:37.630287Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 6 01:23:37.631270 waagent[1572]: 2025-09-06T01:23:37.631204Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 01:23:37.631420 waagent[1572]: 2025-09-06T01:23:37.631371Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 01:23:37.645182 waagent[1572]: 2025-09-06T01:23:37.645070Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 6 01:23:37.645401 waagent[1572]: 2025-09-06T01:23:37.645346Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 6 01:23:37.708674 waagent[1572]: 2025-09-06T01:23:37.708516Z INFO ExtHandler ExtHandler Found private key matching thumbprint 389FA42E1C5A463E3A9F81FE436FB7DF92673A69 Sep 6 01:23:37.709065 waagent[1572]: 2025-09-06T01:23:37.708963Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 6 01:23:37.728063 waagent[1572]: 2025-09-06T01:23:37.727999Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 75fda617-5add-4b5a-8785-58ebd3efd25a New eTag: 9421246261404978332] Sep 6 01:23:37.728758 waagent[1572]: 2025-09-06T01:23:37.728688Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 6 01:23:37.782211 waagent[1572]: 2025-09-06T01:23:37.782052Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 6 01:23:37.805730 waagent[1572]: 2025-09-06T01:23:37.805636Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1572 Sep 6 01:23:37.809771 waagent[1572]: 2025-09-06T01:23:37.809677Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 6 01:23:37.811182 waagent[1572]: 2025-09-06T01:23:37.811106Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 6 01:23:37.918103 waagent[1572]: 2025-09-06T01:23:37.918028Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 6 01:23:37.918576 waagent[1572]: 2025-09-06T01:23:37.918509Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 6 01:23:37.927536 waagent[1572]: 2025-09-06T01:23:37.927457Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 6 01:23:37.928257 waagent[1572]: 2025-09-06T01:23:37.928183Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 6 01:23:37.929756 waagent[1572]: 2025-09-06T01:23:37.929666Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 6 01:23:37.932101 waagent[1572]: 2025-09-06T01:23:37.931999Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 6 01:23:37.936750 waagent[1572]: 2025-09-06T01:23:37.933223Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 6 01:23:37.937847 waagent[1572]: 2025-09-06T01:23:37.937782Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 01:23:37.937968 waagent[1572]: 2025-09-06T01:23:37.937864Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 6 01:23:37.938269 waagent[1572]: 2025-09-06T01:23:37.937662Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 6 01:23:37.938635 waagent[1572]: 2025-09-06T01:23:37.938553Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 01:23:37.939531 waagent[1572]: 2025-09-06T01:23:37.939445Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 6 01:23:37.939666 waagent[1572]: 2025-09-06T01:23:37.939584Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 01:23:37.939959 waagent[1572]: 2025-09-06T01:23:37.939886Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 01:23:37.940481 waagent[1572]: 2025-09-06T01:23:37.940402Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 6 01:23:37.940615 waagent[1572]: 2025-09-06T01:23:37.940558Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 6 01:23:37.942269 waagent[1572]: 2025-09-06T01:23:37.942178Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 6 01:23:37.942269 waagent[1572]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 6 01:23:37.942269 waagent[1572]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 6 01:23:37.942269 waagent[1572]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 6 01:23:37.942269 waagent[1572]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 6 01:23:37.942269 waagent[1572]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 01:23:37.942269 waagent[1572]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 01:23:37.943035 waagent[1572]: 2025-09-06T01:23:37.942866Z INFO EnvHandler ExtHandler Configure routes Sep 6 01:23:37.943941 waagent[1572]: 2025-09-06T01:23:37.943855Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 6 01:23:37.950074 waagent[1572]: 2025-09-06T01:23:37.949942Z INFO EnvHandler ExtHandler Gateway:None Sep 6 01:23:37.953917 waagent[1572]: 2025-09-06T01:23:37.953845Z INFO EnvHandler ExtHandler Routes:None Sep 6 01:23:37.955729 waagent[1572]: 2025-09-06T01:23:37.955648Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 6 01:23:37.957671 waagent[1572]: 2025-09-06T01:23:37.957599Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 6 01:23:37.961059 waagent[1572]: 2025-09-06T01:23:37.960940Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 6 01:23:37.988830 waagent[1572]: 2025-09-06T01:23:37.988674Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1566' Sep 6 01:23:38.030683 waagent[1572]: 2025-09-06T01:23:38.030612Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 6 01:23:38.076704 waagent[1572]: 2025-09-06T01:23:38.076549Z INFO MonitorHandler ExtHandler Network interfaces: Sep 6 01:23:38.076704 waagent[1572]: Executing ['ip', '-a', '-o', 'link']: Sep 6 01:23:38.076704 waagent[1572]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 6 01:23:38.076704 waagent[1572]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f9:37:24 brd ff:ff:ff:ff:ff:ff Sep 6 01:23:38.076704 waagent[1572]: 3: enP42795s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f9:37:24 brd ff:ff:ff:ff:ff:ff\ altname enP42795p0s2 Sep 6 01:23:38.076704 waagent[1572]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 6 01:23:38.076704 waagent[1572]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 6 01:23:38.076704 waagent[1572]: 2: eth0 inet 10.200.20.40/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 6 01:23:38.076704 waagent[1572]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 6 01:23:38.076704 waagent[1572]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 6 01:23:38.076704 waagent[1572]: 2: eth0 inet6 fe80::20d:3aff:fef9:3724/64 scope link \ valid_lft forever preferred_lft forever Sep 6 01:23:38.371022 waagent[1572]: 2025-09-06T01:23:38.370756Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Sep 6 01:23:38.374878 waagent[1572]: 2025-09-06T01:23:38.374736Z INFO EnvHandler ExtHandler Firewall rules: Sep 6 01:23:38.374878 waagent[1572]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:38.374878 waagent[1572]: pkts bytes target prot opt in out source destination Sep 6 01:23:38.374878 waagent[1572]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:38.374878 waagent[1572]: pkts bytes target prot opt in out source destination Sep 6 01:23:38.374878 waagent[1572]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:38.374878 waagent[1572]: pkts bytes target prot opt in out source destination Sep 6 01:23:38.374878 waagent[1572]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 01:23:38.374878 waagent[1572]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 6 01:23:38.376935 waagent[1572]: 2025-09-06T01:23:38.376875Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 6 01:23:38.505892 waagent[1572]: 2025-09-06T01:23:38.505827Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 6 01:23:38.655340 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 01:23:38.655524 systemd[1]: Stopped kubelet.service. Sep 6 01:23:38.657141 systemd[1]: Starting kubelet.service... Sep 6 01:23:38.759101 systemd[1]: Started kubelet.service. Sep 6 01:23:38.935989 kubelet[1614]: E0906 01:23:38.935851 1614 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:38.939183 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:38.939315 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:39.302852 waagent[1515]: 2025-09-06T01:23:39.302651Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 6 01:23:39.308678 waagent[1515]: 2025-09-06T01:23:39.308611Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 6 01:23:40.674689 waagent[1619]: 2025-09-06T01:23:40.674579Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 6 01:23:40.676038 waagent[1619]: 2025-09-06T01:23:40.675935Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 6 01:23:40.676363 waagent[1619]: 2025-09-06T01:23:40.676312Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 6 01:23:40.676609 waagent[1619]: 2025-09-06T01:23:40.676561Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Sep 6 01:23:40.693028 waagent[1619]: 2025-09-06T01:23:40.692858Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 6 01:23:40.693725 waagent[1619]: 2025-09-06T01:23:40.693662Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 01:23:40.694038 waagent[1619]: 2025-09-06T01:23:40.693964Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 01:23:40.694400 waagent[1619]: 2025-09-06T01:23:40.694346Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 6 01:23:40.710177 waagent[1619]: 2025-09-06T01:23:40.710066Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 6 01:23:40.724338 waagent[1619]: 2025-09-06T01:23:40.724263Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.175 Sep 6 01:23:40.725783 waagent[1619]: 2025-09-06T01:23:40.725715Z INFO ExtHandler Sep 6 01:23:40.726169 waagent[1619]: 2025-09-06T01:23:40.726114Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 71c21f52-9f75-4bf9-90ea-bcd3d0597a33 eTag: 9421246261404978332 source: Fabric] Sep 6 01:23:40.727207 waagent[1619]: 2025-09-06T01:23:40.727146Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 6 01:23:40.728742 waagent[1619]: 2025-09-06T01:23:40.728678Z INFO ExtHandler Sep 6 01:23:40.729041 waagent[1619]: 2025-09-06T01:23:40.728965Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 6 01:23:40.737364 waagent[1619]: 2025-09-06T01:23:40.737299Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 6 01:23:40.738188 waagent[1619]: 2025-09-06T01:23:40.738134Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 6 01:23:40.760311 waagent[1619]: 2025-09-06T01:23:40.760237Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 6 01:23:40.835191 waagent[1619]: 2025-09-06T01:23:40.835043Z INFO ExtHandler Downloaded certificate {'thumbprint': '389FA42E1C5A463E3A9F81FE436FB7DF92673A69', 'hasPrivateKey': True} Sep 6 01:23:40.836973 waagent[1619]: 2025-09-06T01:23:40.836890Z INFO ExtHandler Fetch goal state from WireServer completed Sep 6 01:23:40.838282 waagent[1619]: 2025-09-06T01:23:40.838212Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 6 01:23:40.859330 waagent[1619]: 2025-09-06T01:23:40.859193Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 6 01:23:40.869836 waagent[1619]: 2025-09-06T01:23:40.869708Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 6 01:23:40.874911 waagent[1619]: 2025-09-06T01:23:40.874768Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 6 01:23:40.875440 waagent[1619]: 2025-09-06T01:23:40.875374Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 6 01:23:40.916860 waagent[1619]: 2025-09-06T01:23:40.916715Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: Sep 6 01:23:40.916860 waagent[1619]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:40.916860 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:40.916860 waagent[1619]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:40.916860 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:40.916860 waagent[1619]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:40.916860 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:40.916860 waagent[1619]: 82 9259 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 01:23:40.916860 waagent[1619]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 6 01:23:40.918588 waagent[1619]: 2025-09-06T01:23:40.918513Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 6 01:23:40.922481 waagent[1619]: 2025-09-06T01:23:40.922335Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 6 01:23:40.923001 waagent[1619]: 2025-09-06T01:23:40.922931Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 6 01:23:40.923568 waagent[1619]: 2025-09-06T01:23:40.923509Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 6 01:23:40.932919 waagent[1619]: 2025-09-06T01:23:40.932797Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 6 01:23:40.933822 waagent[1619]: 2025-09-06T01:23:40.933745Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 6 01:23:40.943214 waagent[1619]: 2025-09-06T01:23:40.943118Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1619 Sep 6 01:23:40.947133 waagent[1619]: 2025-09-06T01:23:40.947034Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 6 01:23:40.948284 waagent[1619]: 2025-09-06T01:23:40.948219Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 6 01:23:40.949458 waagent[1619]: 2025-09-06T01:23:40.949397Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 6 01:23:40.952509 waagent[1619]: 2025-09-06T01:23:40.952434Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 6 01:23:40.953065 waagent[1619]: 2025-09-06T01:23:40.953005Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 6 01:23:40.954728 waagent[1619]: 2025-09-06T01:23:40.954652Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 6 01:23:40.955051 waagent[1619]: 2025-09-06T01:23:40.954956Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 01:23:40.955382 waagent[1619]: 2025-09-06T01:23:40.955312Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 01:23:40.956367 waagent[1619]: 2025-09-06T01:23:40.956295Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 6 01:23:40.956791 waagent[1619]: 2025-09-06T01:23:40.956725Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 6 01:23:40.956791 waagent[1619]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 6 01:23:40.956791 waagent[1619]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 6 01:23:40.956791 waagent[1619]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 6 01:23:40.956791 waagent[1619]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 6 01:23:40.956791 waagent[1619]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 01:23:40.956791 waagent[1619]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 6 01:23:40.959689 waagent[1619]: 2025-09-06T01:23:40.959565Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 6 01:23:40.960415 waagent[1619]: 2025-09-06T01:23:40.960340Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 6 01:23:40.961119 waagent[1619]: 2025-09-06T01:23:40.960956Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 6 01:23:40.964523 waagent[1619]: 2025-09-06T01:23:40.964365Z INFO EnvHandler ExtHandler Configure routes Sep 6 01:23:40.965115 waagent[1619]: 2025-09-06T01:23:40.965040Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 6 01:23:40.965372 waagent[1619]: 2025-09-06T01:23:40.965311Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 6 01:23:40.969041 waagent[1619]: 2025-09-06T01:23:40.967396Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 6 01:23:40.970061 waagent[1619]: 2025-09-06T01:23:40.969871Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 6 01:23:40.970390 waagent[1619]: 2025-09-06T01:23:40.970315Z INFO EnvHandler ExtHandler Gateway:None Sep 6 01:23:40.970791 waagent[1619]: 2025-09-06T01:23:40.970721Z INFO EnvHandler ExtHandler Routes:None Sep 6 01:23:40.972581 waagent[1619]: 2025-09-06T01:23:40.972505Z INFO MonitorHandler ExtHandler Network interfaces: Sep 6 01:23:40.972581 waagent[1619]: Executing ['ip', '-a', '-o', 'link']: Sep 6 01:23:40.972581 waagent[1619]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 6 01:23:40.972581 waagent[1619]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f9:37:24 brd ff:ff:ff:ff:ff:ff Sep 6 01:23:40.972581 waagent[1619]: 3: enP42795s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f9:37:24 brd ff:ff:ff:ff:ff:ff\ altname enP42795p0s2 Sep 6 01:23:40.972581 waagent[1619]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 6 01:23:40.972581 waagent[1619]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 6 01:23:40.972581 waagent[1619]: 2: eth0 inet 10.200.20.40/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 6 01:23:40.972581 waagent[1619]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 6 01:23:40.972581 waagent[1619]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 6 01:23:40.972581 waagent[1619]: 2: eth0 inet6 fe80::20d:3aff:fef9:3724/64 scope link \ valid_lft forever preferred_lft forever Sep 6 01:23:40.976411 waagent[1619]: 2025-09-06T01:23:40.976223Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 6 01:23:40.998538 waagent[1619]: 2025-09-06T01:23:40.998441Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 6 01:23:41.022338 waagent[1619]: 2025-09-06T01:23:41.022246Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 6 01:23:41.062363 waagent[1619]: 2025-09-06T01:23:41.062262Z INFO ExtHandler ExtHandler Sep 6 01:23:41.062927 waagent[1619]: 2025-09-06T01:23:41.062854Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 50c988e2-d3d3-4129-81b5-218ca528880e correlation d1e326eb-2aa6-41de-b484-43e1476aefec created: 2025-09-06T01:22:15.651672Z] Sep 6 01:23:41.064364 waagent[1619]: 2025-09-06T01:23:41.064287Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: Sep 6 01:23:41.064364 waagent[1619]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:41.064364 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:41.064364 waagent[1619]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:41.064364 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:41.064364 waagent[1619]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:41.064364 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:41.064364 waagent[1619]: 111 12966 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 01:23:41.064364 waagent[1619]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 6 01:23:41.064662 waagent[1619]: 2025-09-06T01:23:41.064592Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 6 01:23:41.072522 waagent[1619]: 2025-09-06T01:23:41.072361Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 10 ms] Sep 6 01:23:41.105799 waagent[1619]: 2025-09-06T01:23:41.105694Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 6 01:23:41.111663 waagent[1619]: 2025-09-06T01:23:41.111448Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: D287F0AC-BE93-499E-A019-9AA0ABAACED1;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 6 01:23:41.142568 waagent[1619]: 2025-09-06T01:23:41.142429Z INFO EnvHandler ExtHandler The firewall was setup successfully: Sep 6 01:23:41.142568 waagent[1619]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:41.142568 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:41.142568 waagent[1619]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:41.142568 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:41.142568 waagent[1619]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 6 01:23:41.142568 waagent[1619]: pkts bytes target prot opt in out source destination Sep 6 01:23:41.142568 waagent[1619]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 6 01:23:41.142568 waagent[1619]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 6 01:23:41.142568 waagent[1619]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 6 01:23:49.155323 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 01:23:49.155489 systemd[1]: Stopped kubelet.service. Sep 6 01:23:49.157071 systemd[1]: Starting kubelet.service... Sep 6 01:23:49.466874 systemd[1]: Started kubelet.service. Sep 6 01:23:49.509854 kubelet[1669]: E0906 01:23:49.509808 1669 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:49.512598 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:49.512732 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:59.655401 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 01:23:59.655574 systemd[1]: Stopped kubelet.service. Sep 6 01:23:59.657178 systemd[1]: Starting kubelet.service... Sep 6 01:23:59.829595 systemd[1]: Started kubelet.service. Sep 6 01:23:59.872484 kubelet[1679]: E0906 01:23:59.872391 1679 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:59.875483 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:59.875641 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:24:02.542968 systemd[1]: Created slice system-sshd.slice. Sep 6 01:24:02.544895 systemd[1]: Started sshd@0-10.200.20.40:22-10.200.16.10:33186.service. Sep 6 01:24:03.122727 sshd[1685]: Accepted publickey for core from 10.200.16.10 port 33186 ssh2: RSA SHA256:61uHVL+Uw1UCTgOuoaZ58b8YSngF6bjnT9fiLryAt68 Sep 6 01:24:03.145351 sshd[1685]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:03.150215 systemd[1]: Started session-3.scope. Sep 6 01:24:03.151053 systemd-logind[1409]: New session 3 of user core. Sep 6 01:24:03.513191 systemd[1]: Started sshd@1-10.200.20.40:22-10.200.16.10:33200.service. Sep 6 01:24:03.935838 sshd[1690]: Accepted publickey for core from 10.200.16.10 port 33200 ssh2: RSA SHA256:61uHVL+Uw1UCTgOuoaZ58b8YSngF6bjnT9fiLryAt68 Sep 6 01:24:03.937548 sshd[1690]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:03.942058 systemd-logind[1409]: New session 4 of user core. Sep 6 01:24:03.942317 systemd[1]: Started session-4.scope. Sep 6 01:24:04.273144 sshd[1690]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:04.276308 systemd-logind[1409]: Session 4 logged out. Waiting for processes to exit. Sep 6 01:24:04.276395 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 01:24:04.277009 systemd[1]: sshd@1-10.200.20.40:22-10.200.16.10:33200.service: Deactivated successfully. Sep 6 01:24:04.278232 systemd-logind[1409]: Removed session 4. Sep 6 01:24:04.348767 systemd[1]: Started sshd@2-10.200.20.40:22-10.200.16.10:33210.service. Sep 6 01:24:04.810954 sshd[1696]: Accepted publickey for core from 10.200.16.10 port 33210 ssh2: RSA SHA256:61uHVL+Uw1UCTgOuoaZ58b8YSngF6bjnT9fiLryAt68 Sep 6 01:24:04.812792 sshd[1696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:04.817028 systemd-logind[1409]: New session 5 of user core. Sep 6 01:24:04.817549 systemd[1]: Started session-5.scope. Sep 6 01:24:05.139881 sshd[1696]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:05.143069 systemd[1]: sshd@2-10.200.20.40:22-10.200.16.10:33210.service: Deactivated successfully. Sep 6 01:24:05.143847 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 01:24:05.144454 systemd-logind[1409]: Session 5 logged out. Waiting for processes to exit. Sep 6 01:24:05.145482 systemd-logind[1409]: Removed session 5. Sep 6 01:24:05.220621 systemd[1]: Started sshd@3-10.200.20.40:22-10.200.16.10:33212.service. Sep 6 01:24:05.670799 sshd[1702]: Accepted publickey for core from 10.200.16.10 port 33212 ssh2: RSA SHA256:61uHVL+Uw1UCTgOuoaZ58b8YSngF6bjnT9fiLryAt68 Sep 6 01:24:05.672638 sshd[1702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:05.677487 systemd[1]: Started session-6.scope. Sep 6 01:24:05.677910 systemd-logind[1409]: New session 6 of user core. Sep 6 01:24:06.023513 sshd[1702]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:06.026089 systemd[1]: sshd@3-10.200.20.40:22-10.200.16.10:33212.service: Deactivated successfully. Sep 6 01:24:06.026847 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 01:24:06.027460 systemd-logind[1409]: Session 6 logged out. Waiting for processes to exit. Sep 6 01:24:06.028416 systemd-logind[1409]: Removed session 6. Sep 6 01:24:06.092070 systemd[1]: Started sshd@4-10.200.20.40:22-10.200.16.10:33216.service. Sep 6 01:24:06.514763 sshd[1708]: Accepted publickey for core from 10.200.16.10 port 33216 ssh2: RSA SHA256:61uHVL+Uw1UCTgOuoaZ58b8YSngF6bjnT9fiLryAt68 Sep 6 01:24:06.516169 sshd[1708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:06.520523 systemd-logind[1409]: New session 7 of user core. Sep 6 01:24:06.521030 systemd[1]: Started session-7.scope. Sep 6 01:24:07.009268 sudo[1711]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 01:24:07.009512 sudo[1711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:24:07.060149 dbus-daemon[1397]: avc: received setenforce notice (enforcing=1) Sep 6 01:24:07.061385 sudo[1711]: pam_unix(sudo:session): session closed for user root Sep 6 01:24:07.158685 sshd[1708]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:07.162274 systemd-logind[1409]: Session 7 logged out. Waiting for processes to exit. Sep 6 01:24:07.162606 systemd[1]: sshd@4-10.200.20.40:22-10.200.16.10:33216.service: Deactivated successfully. Sep 6 01:24:07.163411 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 01:24:07.164333 systemd-logind[1409]: Removed session 7. Sep 6 01:24:07.229766 systemd[1]: Started sshd@5-10.200.20.40:22-10.200.16.10:33220.service. Sep 6 01:24:07.641831 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Sep 6 01:24:07.652073 sshd[1715]: Accepted publickey for core from 10.200.16.10 port 33220 ssh2: RSA SHA256:61uHVL+Uw1UCTgOuoaZ58b8YSngF6bjnT9fiLryAt68 Sep 6 01:24:07.653646 sshd[1715]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:07.658051 systemd-logind[1409]: New session 8 of user core. Sep 6 01:24:07.658645 systemd[1]: Started session-8.scope. Sep 6 01:24:07.895021 sudo[1719]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 01:24:07.895592 sudo[1719]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:24:07.898621 sudo[1719]: pam_unix(sudo:session): session closed for user root Sep 6 01:24:07.903919 sudo[1718]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 01:24:07.904516 sudo[1718]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:24:07.914351 systemd[1]: Stopping audit-rules.service... Sep 6 01:24:07.914000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:24:07.916093 auditctl[1722]: No rules Sep 6 01:24:07.919888 kernel: kauditd_printk_skb: 145 callbacks suppressed Sep 6 01:24:07.919946 kernel: audit: type=1305 audit(1757121847.914:225): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:24:07.920280 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 01:24:07.920467 systemd[1]: Stopped audit-rules.service. Sep 6 01:24:07.922584 systemd[1]: Starting audit-rules.service... Sep 6 01:24:07.914000 audit[1722]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffed8013e0 a2=420 a3=0 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:07.955291 kernel: audit: type=1300 audit(1757121847.914:225): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffed8013e0 a2=420 a3=0 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:07.914000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:24:07.962605 kernel: audit: type=1327 audit(1757121847.914:225): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:24:07.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:07.972845 augenrules[1739]: No rules Sep 6 01:24:07.974111 systemd[1]: Finished audit-rules.service. Sep 6 01:24:07.979697 kernel: audit: type=1131 audit(1757121847.919:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:07.980736 sudo[1718]: pam_unix(sudo:session): session closed for user root Sep 6 01:24:07.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:07.997624 kernel: audit: type=1130 audit(1757121847.972:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:07.979000 audit[1718]: USER_END pid=1718 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.017068 kernel: audit: type=1106 audit(1757121847.979:228): pid=1718 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.017128 kernel: audit: type=1104 audit(1757121847.979:229): pid=1718 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:07.979000 audit[1718]: CRED_DISP pid=1718 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.090148 sshd[1715]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:08.090000 audit[1715]: USER_END pid=1715 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.115611 systemd[1]: sshd@5-10.200.20.40:22-10.200.16.10:33220.service: Deactivated successfully. Sep 6 01:24:08.090000 audit[1715]: CRED_DISP pid=1715 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.135059 kernel: audit: type=1106 audit(1757121848.090:230): pid=1715 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.135138 kernel: audit: type=1104 audit(1757121848.090:231): pid=1715 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.116402 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 01:24:08.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.40:22-10.200.16.10:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.135852 systemd-logind[1409]: Session 8 logged out. Waiting for processes to exit. Sep 6 01:24:08.153774 kernel: audit: type=1131 audit(1757121848.114:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.40:22-10.200.16.10:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.154883 systemd-logind[1409]: Removed session 8. Sep 6 01:24:08.170510 systemd[1]: Started sshd@6-10.200.20.40:22-10.200.16.10:33226.service. Sep 6 01:24:08.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.40:22-10.200.16.10:33226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.620000 audit[1745]: USER_ACCT pid=1745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.621930 sshd[1745]: Accepted publickey for core from 10.200.16.10 port 33226 ssh2: RSA SHA256:61uHVL+Uw1UCTgOuoaZ58b8YSngF6bjnT9fiLryAt68 Sep 6 01:24:08.622000 audit[1745]: CRED_ACQ pid=1745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.622000 audit[1745]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffff503a0 a2=3 a3=1 items=0 ppid=1 pid=1745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.622000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:24:08.623784 sshd[1745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:24:08.628225 systemd-logind[1409]: New session 9 of user core. Sep 6 01:24:08.628732 systemd[1]: Started session-9.scope. Sep 6 01:24:08.632000 audit[1745]: USER_START pid=1745 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.634000 audit[1747]: CRED_ACQ pid=1747 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:08.877000 audit[1748]: USER_ACCT pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.878000 audit[1748]: CRED_REFR pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.879643 sudo[1748]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 01:24:08.879907 sudo[1748]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:24:08.880000 audit[1748]: USER_START pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:08.905995 systemd[1]: Starting coreos-metadata.service... Sep 6 01:24:08.978028 coreos-metadata[1752]: Sep 06 01:24:08.977 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 6 01:24:08.981791 coreos-metadata[1752]: Sep 06 01:24:08.981 INFO Fetch successful Sep 6 01:24:08.982012 coreos-metadata[1752]: Sep 06 01:24:08.981 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 6 01:24:08.984147 coreos-metadata[1752]: Sep 06 01:24:08.984 INFO Fetch successful Sep 6 01:24:08.984457 coreos-metadata[1752]: Sep 06 01:24:08.984 INFO Fetching http://168.63.129.16/machine/18bcd502-1049-4166-b461-5bb84204fc01/46ab7217%2D5216%2D4996%2Db944%2D8aa6cbf976aa.%5Fci%2D3510.3.8%2Dn%2D95263eb338?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 6 01:24:08.986694 coreos-metadata[1752]: Sep 06 01:24:08.986 INFO Fetch successful Sep 6 01:24:09.021056 coreos-metadata[1752]: Sep 06 01:24:09.020 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 6 01:24:09.032610 coreos-metadata[1752]: Sep 06 01:24:09.032 INFO Fetch successful Sep 6 01:24:09.042819 systemd[1]: Finished coreos-metadata.service. Sep 6 01:24:09.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:09.509004 systemd[1]: Stopped kubelet.service. Sep 6 01:24:09.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:09.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:09.511383 systemd[1]: Starting kubelet.service... Sep 6 01:24:09.552734 systemd[1]: Reloading. Sep 6 01:24:09.641045 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2025-09-06T01:24:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:24:09.641750 /usr/lib/systemd/system-generators/torcx-generator[1807]: time="2025-09-06T01:24:09Z" level=info msg="torcx already run" Sep 6 01:24:09.747344 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:24:09.747364 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:24:09.763972 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit: BPF prog-id=47 op=LOAD Sep 6 01:24:09.838000 audit: BPF prog-id=30 op=UNLOAD Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit: BPF prog-id=48 op=LOAD Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.838000 audit: BPF prog-id=49 op=LOAD Sep 6 01:24:09.838000 audit: BPF prog-id=31 op=UNLOAD Sep 6 01:24:09.838000 audit: BPF prog-id=32 op=UNLOAD Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.840000 audit: BPF prog-id=50 op=LOAD Sep 6 01:24:09.840000 audit: BPF prog-id=39 op=UNLOAD Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit: BPF prog-id=51 op=LOAD Sep 6 01:24:09.842000 audit: BPF prog-id=41 op=UNLOAD Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit: BPF prog-id=52 op=LOAD Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit: BPF prog-id=53 op=LOAD Sep 6 01:24:09.842000 audit: BPF prog-id=42 op=UNLOAD Sep 6 01:24:09.842000 audit: BPF prog-id=43 op=UNLOAD Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit: BPF prog-id=54 op=LOAD Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.842000 audit: BPF prog-id=55 op=LOAD Sep 6 01:24:09.842000 audit: BPF prog-id=33 op=UNLOAD Sep 6 01:24:09.842000 audit: BPF prog-id=34 op=UNLOAD Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.843000 audit: BPF prog-id=56 op=LOAD Sep 6 01:24:09.843000 audit: BPF prog-id=40 op=UNLOAD Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit: BPF prog-id=57 op=LOAD Sep 6 01:24:09.846000 audit: BPF prog-id=46 op=UNLOAD Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.846000 audit: BPF prog-id=58 op=LOAD Sep 6 01:24:09.846000 audit: BPF prog-id=44 op=UNLOAD Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit: BPF prog-id=59 op=LOAD Sep 6 01:24:09.847000 audit: BPF prog-id=36 op=UNLOAD Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit: BPF prog-id=60 op=LOAD Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:09.847000 audit: BPF prog-id=61 op=LOAD Sep 6 01:24:09.847000 audit: BPF prog-id=37 op=UNLOAD Sep 6 01:24:09.847000 audit: BPF prog-id=38 op=UNLOAD Sep 6 01:24:09.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:09.869661 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 01:24:09.869850 systemd[1]: Stopped kubelet.service. Sep 6 01:24:09.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:09.872409 systemd[1]: Starting kubelet.service... Sep 6 01:24:10.005758 systemd[1]: Started kubelet.service. Sep 6 01:24:10.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:10.180550 kubelet[1873]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:24:10.181038 kubelet[1873]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 01:24:10.181096 kubelet[1873]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:24:10.181255 kubelet[1873]: I0906 01:24:10.181222 1873 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 01:24:11.099040 kubelet[1873]: I0906 01:24:11.098970 1873 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 6 01:24:11.099040 kubelet[1873]: I0906 01:24:11.099032 1873 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 01:24:11.099293 kubelet[1873]: I0906 01:24:11.099271 1873 server.go:956] "Client rotation is on, will bootstrap in background" Sep 6 01:24:11.121186 kubelet[1873]: I0906 01:24:11.121139 1873 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 01:24:11.131376 kubelet[1873]: E0906 01:24:11.131301 1873 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 01:24:11.131553 kubelet[1873]: I0906 01:24:11.131540 1873 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 01:24:11.134996 kubelet[1873]: I0906 01:24:11.134952 1873 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 01:24:11.136664 kubelet[1873]: I0906 01:24:11.136612 1873 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 01:24:11.137411 kubelet[1873]: I0906 01:24:11.136848 1873 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.40","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 01:24:11.137591 kubelet[1873]: I0906 01:24:11.137578 1873 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 01:24:11.137670 kubelet[1873]: I0906 01:24:11.137662 1873 container_manager_linux.go:303] "Creating device plugin manager" Sep 6 01:24:11.138402 kubelet[1873]: I0906 01:24:11.138385 1873 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:24:11.145614 kubelet[1873]: I0906 01:24:11.145585 1873 kubelet.go:480] "Attempting to sync node with API server" Sep 6 01:24:11.145787 kubelet[1873]: I0906 01:24:11.145776 1873 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 01:24:11.145869 kubelet[1873]: I0906 01:24:11.145860 1873 kubelet.go:386] "Adding apiserver pod source" Sep 6 01:24:11.145935 kubelet[1873]: I0906 01:24:11.145926 1873 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 01:24:11.146122 kubelet[1873]: E0906 01:24:11.146088 1873 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:11.146180 kubelet[1873]: E0906 01:24:11.146130 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:11.147038 kubelet[1873]: I0906 01:24:11.147014 1873 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 01:24:11.147890 kubelet[1873]: I0906 01:24:11.147870 1873 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 6 01:24:11.148072 kubelet[1873]: W0906 01:24:11.148061 1873 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 01:24:11.151063 kubelet[1873]: I0906 01:24:11.151037 1873 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 01:24:11.151253 kubelet[1873]: I0906 01:24:11.151242 1873 server.go:1289] "Started kubelet" Sep 6 01:24:11.151479 kubelet[1873]: I0906 01:24:11.151429 1873 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 01:24:11.152447 kubelet[1873]: I0906 01:24:11.152412 1873 server.go:317] "Adding debug handlers to kubelet server" Sep 6 01:24:11.154644 kubelet[1873]: I0906 01:24:11.154574 1873 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 01:24:11.155319 kubelet[1873]: I0906 01:24:11.155296 1873 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 01:24:11.155000 audit[1873]: AVC avc: denied { mac_admin } for pid=1873 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.155000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:24:11.155000 audit[1873]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000075440 a1=4000ae4f90 a2=4000075380 a3=25 items=0 ppid=1 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:24:11.156000 audit[1873]: AVC avc: denied { mac_admin } for pid=1873 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.156000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:24:11.156000 audit[1873]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000164980 a1=4000ae4fa8 a2=4000075650 a3=25 items=0 ppid=1 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:24:11.157448 kubelet[1873]: I0906 01:24:11.157023 1873 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 01:24:11.157448 kubelet[1873]: I0906 01:24:11.157066 1873 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 01:24:11.157448 kubelet[1873]: I0906 01:24:11.157143 1873 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 01:24:11.162744 kubelet[1873]: E0906 01:24:11.162701 1873 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.200.20.40\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 6 01:24:11.162000 audit[1889]: NETFILTER_CFG table=mangle:9 family=2 entries=2 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.162000 audit[1889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe372ad40 a2=0 a3=1 items=0 ppid=1873 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:24:11.163000 audit[1890]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.163000 audit[1890]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd0bc7320 a2=0 a3=1 items=0 ppid=1873 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:24:11.164502 kubelet[1873]: E0906 01:24:11.162912 1873 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.40.18628d0394f1e337 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.40,UID:10.200.20.40,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.40,},FirstTimestamp:2025-09-06 01:24:11.151213367 +0000 UTC m=+1.140492282,LastTimestamp:2025-09-06 01:24:11.151213367 +0000 UTC m=+1.140492282,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.40,}" Sep 6 01:24:11.164925 kubelet[1873]: E0906 01:24:11.164894 1873 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 6 01:24:11.166121 kubelet[1873]: I0906 01:24:11.166090 1873 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 01:24:11.167110 kubelet[1873]: E0906 01:24:11.167083 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:11.167278 kubelet[1873]: I0906 01:24:11.167265 1873 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 01:24:11.167580 kubelet[1873]: I0906 01:24:11.167561 1873 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 01:24:11.167700 kubelet[1873]: I0906 01:24:11.167690 1873 reconciler.go:26] "Reconciler: start to sync state" Sep 6 01:24:11.168609 kubelet[1873]: I0906 01:24:11.168582 1873 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 01:24:11.169743 kubelet[1873]: E0906 01:24:11.169719 1873 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 01:24:11.170401 kubelet[1873]: I0906 01:24:11.170384 1873 factory.go:223] Registration of the containerd container factory successfully Sep 6 01:24:11.170517 kubelet[1873]: I0906 01:24:11.170506 1873 factory.go:223] Registration of the systemd container factory successfully Sep 6 01:24:11.170000 audit[1892]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.170000 audit[1892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcbd6f350 a2=0 a3=1 items=0 ppid=1873 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:24:11.172000 audit[1894]: NETFILTER_CFG table=filter:12 family=2 entries=2 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.172000 audit[1894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcf267a60 a2=0 a3=1 items=0 ppid=1873 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:24:11.195254 kubelet[1873]: E0906 01:24:11.195221 1873 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.40\" not found" node="10.200.20.40" Sep 6 01:24:11.196277 kubelet[1873]: I0906 01:24:11.196251 1873 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 01:24:11.196432 kubelet[1873]: I0906 01:24:11.196416 1873 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 01:24:11.196517 kubelet[1873]: I0906 01:24:11.196508 1873 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:24:11.202129 kubelet[1873]: I0906 01:24:11.202100 1873 policy_none.go:49] "None policy: Start" Sep 6 01:24:11.202278 kubelet[1873]: I0906 01:24:11.202267 1873 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 01:24:11.202335 kubelet[1873]: I0906 01:24:11.202327 1873 state_mem.go:35] "Initializing new in-memory state store" Sep 6 01:24:11.215677 systemd[1]: Created slice kubepods.slice. Sep 6 01:24:11.228763 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 01:24:11.232857 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 01:24:11.233000 audit[1903]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.233000 audit[1903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffccf81010 a2=0 a3=1 items=0 ppid=1873 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 01:24:11.235229 kubelet[1873]: I0906 01:24:11.235184 1873 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 6 01:24:11.235000 audit[1905]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.235000 audit[1905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdcfe10f0 a2=0 a3=1 items=0 ppid=1873 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.235000 audit[1904]: NETFILTER_CFG table=mangle:15 family=10 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:11.235000 audit[1904]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd65c3f00 a2=0 a3=1 items=0 ppid=1873 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:24:11.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:24:11.236912 kubelet[1873]: I0906 01:24:11.236884 1873 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 6 01:24:11.237039 kubelet[1873]: I0906 01:24:11.237028 1873 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 6 01:24:11.237115 kubelet[1873]: I0906 01:24:11.237105 1873 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 01:24:11.237168 kubelet[1873]: I0906 01:24:11.237159 1873 kubelet.go:2436] "Starting kubelet main sync loop" Sep 6 01:24:11.237349 kubelet[1873]: E0906 01:24:11.237330 1873 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 01:24:11.239773 kubelet[1873]: E0906 01:24:11.239745 1873 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 6 01:24:11.238000 audit[1873]: AVC avc: denied { mac_admin } for pid=1873 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.238000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:24:11.238000 audit[1873]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d84bd0 a1=400063b818 a2=4000d84ba0 a3=25 items=0 ppid=1 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.238000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:24:11.240638 kubelet[1873]: E0906 01:24:11.240524 1873 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 6 01:24:11.240718 kubelet[1873]: I0906 01:24:11.240674 1873 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 01:24:11.240746 kubelet[1873]: I0906 01:24:11.240688 1873 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 01:24:11.241811 kubelet[1873]: I0906 01:24:11.241470 1873 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 01:24:11.242937 kubelet[1873]: E0906 01:24:11.242750 1873 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 01:24:11.242937 kubelet[1873]: E0906 01:24:11.242804 1873 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.40\" not found" Sep 6 01:24:11.244000 audit[1907]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.244000 audit[1907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffceb380e0 a2=0 a3=1 items=0 ppid=1873 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:24:11.244000 audit[1906]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:11.244000 audit[1906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd35b85c0 a2=0 a3=1 items=0 ppid=1873 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:24:11.245000 audit[1908]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:11.245000 audit[1908]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca9bb5b0 a2=0 a3=1 items=0 ppid=1873 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:24:11.246000 audit[1909]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:11.246000 audit[1909]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcc211f80 a2=0 a3=1 items=0 ppid=1873 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:24:11.248000 audit[1910]: NETFILTER_CFG table=filter:20 family=10 entries=2 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:11.248000 audit[1910]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe94a19d0 a2=0 a3=1 items=0 ppid=1873 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:24:11.342309 kubelet[1873]: I0906 01:24:11.342282 1873 kubelet_node_status.go:75] "Attempting to register node" node="10.200.20.40" Sep 6 01:24:11.347199 kubelet[1873]: I0906 01:24:11.347163 1873 kubelet_node_status.go:78] "Successfully registered node" node="10.200.20.40" Sep 6 01:24:11.347199 kubelet[1873]: E0906 01:24:11.347204 1873 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.200.20.40\": node \"10.200.20.40\" not found" Sep 6 01:24:11.366031 kubelet[1873]: E0906 01:24:11.365344 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:11.466249 kubelet[1873]: E0906 01:24:11.466214 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:11.541247 sudo[1748]: pam_unix(sudo:session): session closed for user root Sep 6 01:24:11.540000 audit[1748]: USER_END pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:11.540000 audit[1748]: CRED_DISP pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:11.567306 kubelet[1873]: E0906 01:24:11.567270 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:11.631213 sshd[1745]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:11.631000 audit[1745]: USER_END pid=1745 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:11.631000 audit[1745]: CRED_DISP pid=1745 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 6 01:24:11.633854 systemd[1]: sshd@6-10.200.20.40:22-10.200.16.10:33226.service: Deactivated successfully. Sep 6 01:24:11.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.40:22-10.200.16.10:33226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:11.634636 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 01:24:11.635197 systemd-logind[1409]: Session 9 logged out. Waiting for processes to exit. Sep 6 01:24:11.635953 systemd-logind[1409]: Removed session 9. Sep 6 01:24:11.668020 kubelet[1873]: E0906 01:24:11.667986 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:11.768305 kubelet[1873]: E0906 01:24:11.768280 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:11.868714 kubelet[1873]: E0906 01:24:11.868670 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:11.969056 kubelet[1873]: E0906 01:24:11.969026 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:12.069435 kubelet[1873]: E0906 01:24:12.069409 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:12.101735 kubelet[1873]: I0906 01:24:12.101712 1873 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 6 01:24:12.102110 kubelet[1873]: I0906 01:24:12.102039 1873 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 01:24:12.102243 kubelet[1873]: I0906 01:24:12.102224 1873 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 6 01:24:12.146944 kubelet[1873]: E0906 01:24:12.146919 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:12.170270 kubelet[1873]: E0906 01:24:12.170240 1873 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.40\" not found" Sep 6 01:24:12.271660 kubelet[1873]: I0906 01:24:12.271563 1873 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 6 01:24:12.272481 env[1420]: time="2025-09-06T01:24:12.272427936Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 01:24:12.272964 kubelet[1873]: I0906 01:24:12.272944 1873 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 6 01:24:13.100701 update_engine[1414]: I0906 01:24:13.100654 1414 update_attempter.cc:509] Updating boot flags... Sep 6 01:24:13.147296 kubelet[1873]: E0906 01:24:13.147244 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:13.147450 kubelet[1873]: I0906 01:24:13.147335 1873 apiserver.go:52] "Watching apiserver" Sep 6 01:24:13.167767 systemd[1]: Created slice kubepods-besteffort-pod7f5225d3_c7d3_4fba_af7e_2dd7a62c1481.slice. Sep 6 01:24:13.176855 kubelet[1873]: I0906 01:24:13.176821 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-tigera-ca-bundle\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.178446 kubelet[1873]: I0906 01:24:13.178406 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-var-run-calico\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.183680 kubelet[1873]: I0906 01:24:13.183643 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/965babbd-7255-47c8-b6e2-f2f770fa68c1-socket-dir\") pod \"csi-node-driver-grx5f\" (UID: \"965babbd-7255-47c8-b6e2-f2f770fa68c1\") " pod="calico-system/csi-node-driver-grx5f" Sep 6 01:24:13.184180 kubelet[1873]: I0906 01:24:13.184067 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/965babbd-7255-47c8-b6e2-f2f770fa68c1-varrun\") pod \"csi-node-driver-grx5f\" (UID: \"965babbd-7255-47c8-b6e2-f2f770fa68c1\") " pod="calico-system/csi-node-driver-grx5f" Sep 6 01:24:13.184180 kubelet[1873]: I0906 01:24:13.184110 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-cni-log-dir\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184180 kubelet[1873]: I0906 01:24:13.184131 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/616f552b-3929-45ac-b327-f47af631a6cc-kube-proxy\") pod \"kube-proxy-vz2sn\" (UID: \"616f552b-3929-45ac-b327-f47af631a6cc\") " pod="kube-system/kube-proxy-vz2sn" Sep 6 01:24:13.184180 kubelet[1873]: I0906 01:24:13.184148 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vpqbx\" (UniqueName: \"kubernetes.io/projected/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-kube-api-access-vpqbx\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184360 kubelet[1873]: I0906 01:24:13.184297 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/965babbd-7255-47c8-b6e2-f2f770fa68c1-kubelet-dir\") pod \"csi-node-driver-grx5f\" (UID: \"965babbd-7255-47c8-b6e2-f2f770fa68c1\") " pod="calico-system/csi-node-driver-grx5f" Sep 6 01:24:13.184360 kubelet[1873]: I0906 01:24:13.184318 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-cni-bin-dir\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184360 kubelet[1873]: I0906 01:24:13.184334 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-cni-net-dir\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184431 kubelet[1873]: I0906 01:24:13.184363 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-lib-modules\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184431 kubelet[1873]: I0906 01:24:13.184381 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-var-lib-calico\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184431 kubelet[1873]: I0906 01:24:13.184414 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6n8f8\" (UniqueName: \"kubernetes.io/projected/965babbd-7255-47c8-b6e2-f2f770fa68c1-kube-api-access-6n8f8\") pod \"csi-node-driver-grx5f\" (UID: \"965babbd-7255-47c8-b6e2-f2f770fa68c1\") " pod="calico-system/csi-node-driver-grx5f" Sep 6 01:24:13.184500 kubelet[1873]: I0906 01:24:13.184440 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/616f552b-3929-45ac-b327-f47af631a6cc-xtables-lock\") pod \"kube-proxy-vz2sn\" (UID: \"616f552b-3929-45ac-b327-f47af631a6cc\") " pod="kube-system/kube-proxy-vz2sn" Sep 6 01:24:13.184500 kubelet[1873]: I0906 01:24:13.184463 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-node-certs\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184547 kubelet[1873]: I0906 01:24:13.184532 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/965babbd-7255-47c8-b6e2-f2f770fa68c1-registration-dir\") pod \"csi-node-driver-grx5f\" (UID: \"965babbd-7255-47c8-b6e2-f2f770fa68c1\") " pod="calico-system/csi-node-driver-grx5f" Sep 6 01:24:13.184568 kubelet[1873]: I0906 01:24:13.184550 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/616f552b-3929-45ac-b327-f47af631a6cc-lib-modules\") pod \"kube-proxy-vz2sn\" (UID: \"616f552b-3929-45ac-b327-f47af631a6cc\") " pod="kube-system/kube-proxy-vz2sn" Sep 6 01:24:13.184568 kubelet[1873]: I0906 01:24:13.184564 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-thvzc\" (UniqueName: \"kubernetes.io/projected/616f552b-3929-45ac-b327-f47af631a6cc-kube-api-access-thvzc\") pod \"kube-proxy-vz2sn\" (UID: \"616f552b-3929-45ac-b327-f47af631a6cc\") " pod="kube-system/kube-proxy-vz2sn" Sep 6 01:24:13.184617 kubelet[1873]: I0906 01:24:13.184581 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-xtables-lock\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184617 kubelet[1873]: I0906 01:24:13.184611 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-flexvol-driver-host\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184667 kubelet[1873]: I0906 01:24:13.184632 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7f5225d3-c7d3-4fba-af7e-2dd7a62c1481-policysync\") pod \"calico-node-zhjzh\" (UID: \"7f5225d3-c7d3-4fba-af7e-2dd7a62c1481\") " pod="calico-system/calico-node-zhjzh" Sep 6 01:24:13.184667 kubelet[1873]: E0906 01:24:13.178758 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:13.189215 systemd[1]: Created slice kubepods-besteffort-pod616f552b_3929_45ac_b327_f47af631a6cc.slice. Sep 6 01:24:13.268599 kubelet[1873]: I0906 01:24:13.268539 1873 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 01:24:13.287101 kubelet[1873]: I0906 01:24:13.287064 1873 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 01:24:13.301687 kubelet[1873]: E0906 01:24:13.301660 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:13.302440 kubelet[1873]: W0906 01:24:13.302395 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:13.302440 kubelet[1873]: E0906 01:24:13.302434 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:13.311367 kubelet[1873]: E0906 01:24:13.311326 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:13.311367 kubelet[1873]: W0906 01:24:13.311356 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:13.311552 kubelet[1873]: E0906 01:24:13.311383 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:13.312046 kubelet[1873]: E0906 01:24:13.311961 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:13.312046 kubelet[1873]: W0906 01:24:13.311995 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:13.312046 kubelet[1873]: E0906 01:24:13.312010 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:13.312361 kubelet[1873]: E0906 01:24:13.312341 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:13.312420 kubelet[1873]: W0906 01:24:13.312359 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:13.312420 kubelet[1873]: E0906 01:24:13.312379 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:13.313105 kubelet[1873]: E0906 01:24:13.313086 1873 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:13.313216 kubelet[1873]: W0906 01:24:13.313202 1873 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:13.313280 kubelet[1873]: E0906 01:24:13.313269 1873 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:13.479354 env[1420]: time="2025-09-06T01:24:13.478821860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zhjzh,Uid:7f5225d3-c7d3-4fba-af7e-2dd7a62c1481,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:13.494773 env[1420]: time="2025-09-06T01:24:13.494730874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vz2sn,Uid:616f552b-3929-45ac-b327-f47af631a6cc,Namespace:kube-system,Attempt:0,}" Sep 6 01:24:14.147403 kubelet[1873]: E0906 01:24:14.147365 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:15.147607 kubelet[1873]: E0906 01:24:15.147544 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:15.238358 kubelet[1873]: E0906 01:24:15.238191 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:16.148242 kubelet[1873]: E0906 01:24:16.148116 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:16.891264 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount449903729.mount: Deactivated successfully. Sep 6 01:24:16.921864 env[1420]: time="2025-09-06T01:24:16.921810133Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:16.937592 env[1420]: time="2025-09-06T01:24:16.937526257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:16.944052 env[1420]: time="2025-09-06T01:24:16.944002035Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:16.955301 env[1420]: time="2025-09-06T01:24:16.955249386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:16.969485 env[1420]: time="2025-09-06T01:24:16.969438506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:16.973557 env[1420]: time="2025-09-06T01:24:16.973500357Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:16.984687 env[1420]: time="2025-09-06T01:24:16.984634828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:16.987036 env[1420]: time="2025-09-06T01:24:16.986972195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:17.076367 env[1420]: time="2025-09-06T01:24:17.076273750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:17.076367 env[1420]: time="2025-09-06T01:24:17.076322070Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:17.076597 env[1420]: time="2025-09-06T01:24:17.076340750Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:17.076672 env[1420]: time="2025-09-06T01:24:17.076599711Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6 pid=1967 runtime=io.containerd.runc.v2 Sep 6 01:24:17.087419 env[1420]: time="2025-09-06T01:24:17.087328659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:17.087632 env[1420]: time="2025-09-06T01:24:17.087607620Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:17.087742 env[1420]: time="2025-09-06T01:24:17.087720900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:17.088065 env[1420]: time="2025-09-06T01:24:17.088023421Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c518d5428fca7f086822c6e37982e071bbcb8799f57c222764521ea3660ebea pid=1986 runtime=io.containerd.runc.v2 Sep 6 01:24:17.092212 systemd[1]: Started cri-containerd-a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6.scope. Sep 6 01:24:17.109960 systemd[1]: Started cri-containerd-1c518d5428fca7f086822c6e37982e071bbcb8799f57c222764521ea3660ebea.scope. Sep 6 01:24:17.136802 kernel: kauditd_printk_skb: 242 callbacks suppressed Sep 6 01:24:17.136943 kernel: audit: type=1400 audit(1757121857.116:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.148635 kubelet[1873]: E0906 01:24:17.148497 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:17.152899 kernel: audit: type=1400 audit(1757121857.116:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.170621 kernel: audit: type=1400 audit(1757121857.116:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.192201 kernel: audit: type=1400 audit(1757121857.116:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.192300 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 01:24:17.192363 kernel: audit: type=1400 audit(1757121857.116:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.215370 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 6 01:24:17.215502 kernel: audit: type=1400 audit(1757121857.116:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.215535 kernel: audit: type=1400 audit(1757121857.116:446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.240039 kernel: audit: backlog limit exceeded Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit: BPF prog-id=62 op=LOAD Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1967 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623838663737643665646362616363343536656164383431323631 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1967 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623838663737643665646362616363343536656164383431323631 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.116000 audit: BPF prog-id=63 op=LOAD Sep 6 01:24:17.116000 audit[1985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1967 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623838663737643665646362616363343536656164383431323631 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.121000 audit: BPF prog-id=64 op=LOAD Sep 6 01:24:17.121000 audit[1985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1967 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623838663737643665646362616363343536656164383431323631 Sep 6 01:24:17.136000 audit: BPF prog-id=64 op=UNLOAD Sep 6 01:24:17.136000 audit: BPF prog-id=63 op=UNLOAD Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.136000 audit: BPF prog-id=65 op=LOAD Sep 6 01:24:17.136000 audit[1985]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1967 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623838663737643665646362616363343536656164383431323631 Sep 6 01:24:17.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.244056 kubelet[1873]: E0906 01:24:17.242565 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:17.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.255000 audit: BPF prog-id=66 op=LOAD Sep 6 01:24:17.260500 env[1420]: time="2025-09-06T01:24:17.257549464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zhjzh,Uid:7f5225d3-c7d3-4fba-af7e-2dd7a62c1481,Namespace:calico-system,Attempt:0,} returns sandbox id \"a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6\"" Sep 6 01:24:17.260698 env[1420]: time="2025-09-06T01:24:17.260646112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1986 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163353138643534323866636137663038363832326336653337393832 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1986 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163353138643534323866636137663038363832326336653337393832 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.260000 audit: BPF prog-id=67 op=LOAD Sep 6 01:24:17.260000 audit[2009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1986 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163353138643534323866636137663038363832326336653337393832 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.261000 audit: BPF prog-id=68 op=LOAD Sep 6 01:24:17.261000 audit[2009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1986 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163353138643534323866636137663038363832326336653337393832 Sep 6 01:24:17.262000 audit: BPF prog-id=68 op=UNLOAD Sep 6 01:24:17.262000 audit: BPF prog-id=67 op=UNLOAD Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:17.262000 audit: BPF prog-id=69 op=LOAD Sep 6 01:24:17.262000 audit[2009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1986 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:17.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163353138643534323866636137663038363832326336653337393832 Sep 6 01:24:17.280666 env[1420]: time="2025-09-06T01:24:17.280587324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vz2sn,Uid:616f552b-3929-45ac-b327-f47af631a6cc,Namespace:kube-system,Attempt:0,} returns sandbox id \"1c518d5428fca7f086822c6e37982e071bbcb8799f57c222764521ea3660ebea\"" Sep 6 01:24:18.149503 kubelet[1873]: E0906 01:24:18.149467 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:18.485091 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1499127198.mount: Deactivated successfully. Sep 6 01:24:18.666755 env[1420]: time="2025-09-06T01:24:18.666698755Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:18.678806 env[1420]: time="2025-09-06T01:24:18.678751825Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:18.686671 env[1420]: time="2025-09-06T01:24:18.686627484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:18.700998 env[1420]: time="2025-09-06T01:24:18.700948199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:18.701375 env[1420]: time="2025-09-06T01:24:18.701343080Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 6 01:24:18.703900 env[1420]: time="2025-09-06T01:24:18.703850486Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\"" Sep 6 01:24:18.710451 env[1420]: time="2025-09-06T01:24:18.710400862Z" level=info msg="CreateContainer within sandbox \"a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 01:24:18.747955 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1152859156.mount: Deactivated successfully. Sep 6 01:24:18.777642 env[1420]: time="2025-09-06T01:24:18.777574227Z" level=info msg="CreateContainer within sandbox \"a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ebe4c87b24f3dfb970bb05499fef71ae1cb8f26b7fc38c04c2d35be3f126e794\"" Sep 6 01:24:18.778621 env[1420]: time="2025-09-06T01:24:18.778575309Z" level=info msg="StartContainer for \"ebe4c87b24f3dfb970bb05499fef71ae1cb8f26b7fc38c04c2d35be3f126e794\"" Sep 6 01:24:18.799823 systemd[1]: Started cri-containerd-ebe4c87b24f3dfb970bb05499fef71ae1cb8f26b7fc38c04c2d35be3f126e794.scope. Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1967 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:18.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653463383762323466336466623937306262303534393966656637 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit: BPF prog-id=70 op=LOAD Sep 6 01:24:18.821000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1967 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:18.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653463383762323466336466623937306262303534393966656637 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit: BPF prog-id=71 op=LOAD Sep 6 01:24:18.821000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1967 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:18.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653463383762323466336466623937306262303534393966656637 Sep 6 01:24:18.821000 audit: BPF prog-id=71 op=UNLOAD Sep 6 01:24:18.821000 audit: BPF prog-id=70 op=UNLOAD Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { perfmon } for pid=2053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit[2053]: AVC avc: denied { bpf } for pid=2053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:18.821000 audit: BPF prog-id=72 op=LOAD Sep 6 01:24:18.821000 audit[2053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1967 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:18.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562653463383762323466336466623937306262303534393966656637 Sep 6 01:24:18.848190 env[1420]: time="2025-09-06T01:24:18.848137119Z" level=info msg="StartContainer for \"ebe4c87b24f3dfb970bb05499fef71ae1cb8f26b7fc38c04c2d35be3f126e794\" returns successfully" Sep 6 01:24:18.852403 systemd[1]: cri-containerd-ebe4c87b24f3dfb970bb05499fef71ae1cb8f26b7fc38c04c2d35be3f126e794.scope: Deactivated successfully. Sep 6 01:24:18.855000 audit: BPF prog-id=72 op=UNLOAD Sep 6 01:24:18.927550 env[1420]: time="2025-09-06T01:24:18.927493514Z" level=info msg="shim disconnected" id=ebe4c87b24f3dfb970bb05499fef71ae1cb8f26b7fc38c04c2d35be3f126e794 Sep 6 01:24:18.927550 env[1420]: time="2025-09-06T01:24:18.927546874Z" level=warning msg="cleaning up after shim disconnected" id=ebe4c87b24f3dfb970bb05499fef71ae1cb8f26b7fc38c04c2d35be3f126e794 namespace=k8s.io Sep 6 01:24:18.927550 env[1420]: time="2025-09-06T01:24:18.927557714Z" level=info msg="cleaning up dead shim" Sep 6 01:24:18.936973 env[1420]: time="2025-09-06T01:24:18.936911137Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:24:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2092 runtime=io.containerd.runc.v2\n" Sep 6 01:24:19.150540 kubelet[1873]: E0906 01:24:19.150391 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:19.238717 kubelet[1873]: E0906 01:24:19.238266 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:20.019279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3739363698.mount: Deactivated successfully. Sep 6 01:24:20.151537 kubelet[1873]: E0906 01:24:20.151482 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:20.582863 env[1420]: time="2025-09-06T01:24:20.582813562Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:20.591718 env[1420]: time="2025-09-06T01:24:20.591669701Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e19c0cda155dad39120317830ddb8b2bc22070f2c6a97973e96fb09ef504ee64,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:20.596914 env[1420]: time="2025-09-06T01:24:20.596871592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:20.601739 env[1420]: time="2025-09-06T01:24:20.601698162Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bb04e9247da3aaeb96406b4d530a79fc865695b6807353dd1a28871df0d7f837,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:20.602090 env[1420]: time="2025-09-06T01:24:20.602054563Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\" returns image reference \"sha256:e19c0cda155dad39120317830ddb8b2bc22070f2c6a97973e96fb09ef504ee64\"" Sep 6 01:24:20.604154 env[1420]: time="2025-09-06T01:24:20.604108367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 01:24:20.612437 env[1420]: time="2025-09-06T01:24:20.612388305Z" level=info msg="CreateContainer within sandbox \"1c518d5428fca7f086822c6e37982e071bbcb8799f57c222764521ea3660ebea\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 01:24:20.648567 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2343216172.mount: Deactivated successfully. Sep 6 01:24:20.674523 env[1420]: time="2025-09-06T01:24:20.674467959Z" level=info msg="CreateContainer within sandbox \"1c518d5428fca7f086822c6e37982e071bbcb8799f57c222764521ea3660ebea\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8086a665a2c125c9b0f084e48189245fd63dde41310e9d7eb198632495208add\"" Sep 6 01:24:20.675448 env[1420]: time="2025-09-06T01:24:20.675415801Z" level=info msg="StartContainer for \"8086a665a2c125c9b0f084e48189245fd63dde41310e9d7eb198632495208add\"" Sep 6 01:24:20.697558 systemd[1]: Started cri-containerd-8086a665a2c125c9b0f084e48189245fd63dde41310e9d7eb198632495208add.scope. Sep 6 01:24:20.720000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.720000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1986 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383661363635613263313235633962306630383465343831383932 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit: BPF prog-id=73 op=LOAD Sep 6 01:24:20.721000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1986 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383661363635613263313235633962306630383465343831383932 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.721000 audit: BPF prog-id=74 op=LOAD Sep 6 01:24:20.721000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1986 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383661363635613263313235633962306630383465343831383932 Sep 6 01:24:20.722000 audit: BPF prog-id=74 op=UNLOAD Sep 6 01:24:20.722000 audit: BPF prog-id=73 op=UNLOAD Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:20.722000 audit: BPF prog-id=75 op=LOAD Sep 6 01:24:20.722000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1986 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383661363635613263313235633962306630383465343831383932 Sep 6 01:24:20.748518 env[1420]: time="2025-09-06T01:24:20.748445678Z" level=info msg="StartContainer for \"8086a665a2c125c9b0f084e48189245fd63dde41310e9d7eb198632495208add\" returns successfully" Sep 6 01:24:20.874000 audit[2180]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.874000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed005120 a2=0 a3=1 items=0 ppid=2130 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:24:20.876000 audit[2181]: NETFILTER_CFG table=mangle:22 family=10 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:20.876000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed596850 a2=0 a3=1 items=0 ppid=2130 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:24:20.878000 audit[2184]: NETFILTER_CFG table=nat:23 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:20.878000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec7c5920 a2=0 a3=1 items=0 ppid=2130 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:24:20.880000 audit[2185]: NETFILTER_CFG table=nat:24 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.880000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1b53cc0 a2=0 a3=1 items=0 ppid=2130 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:24:20.882000 audit[2188]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.882000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff2ff430 a2=0 a3=1 items=0 ppid=2130 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:24:20.883000 audit[2186]: NETFILTER_CFG table=filter:26 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:20.883000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce3b77e0 a2=0 a3=1 items=0 ppid=2130 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:24:20.981000 audit[2189]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.981000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcd339830 a2=0 a3=1 items=0 ppid=2130 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:24:20.985000 audit[2191]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.985000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc54300f0 a2=0 a3=1 items=0 ppid=2130 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 01:24:20.989000 audit[2194]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.989000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffde28ca60 a2=0 a3=1 items=0 ppid=2130 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 01:24:20.990000 audit[2195]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.990000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef5a4820 a2=0 a3=1 items=0 ppid=2130 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:24:20.993000 audit[2197]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.993000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5b3f6c0 a2=0 a3=1 items=0 ppid=2130 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:24:20.995000 audit[2198]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.995000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee187c90 a2=0 a3=1 items=0 ppid=2130 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:24:20.998000 audit[2200]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:20.998000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe7e0dbf0 a2=0 a3=1 items=0 ppid=2130 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:24:21.002000 audit[2203]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.002000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe481c3e0 a2=0 a3=1 items=0 ppid=2130 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 01:24:21.004000 audit[2204]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.004000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce58e4b0 a2=0 a3=1 items=0 ppid=2130 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:24:21.007000 audit[2206]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.007000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4fd0a20 a2=0 a3=1 items=0 ppid=2130 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:24:21.009000 audit[2207]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.009000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9f26530 a2=0 a3=1 items=0 ppid=2130 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:24:21.013000 audit[2209]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.013000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff8092450 a2=0 a3=1 items=0 ppid=2130 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:24:21.018000 audit[2212]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.018000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffca39f490 a2=0 a3=1 items=0 ppid=2130 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:24:21.022000 audit[2215]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.022000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe6f8acc0 a2=0 a3=1 items=0 ppid=2130 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:24:21.023000 audit[2216]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.023000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff95fc060 a2=0 a3=1 items=0 ppid=2130 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:24:21.026000 audit[2218]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.026000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd23fe740 a2=0 a3=1 items=0 ppid=2130 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:21.092000 audit[2222]: NETFILTER_CFG table=nat:43 family=2 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.092000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffef70aca0 a2=0 a3=1 items=0 ppid=2130 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:21.093000 audit[2223]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.093000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc09ce740 a2=0 a3=1 items=0 ppid=2130 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:24:21.096000 audit[2225]: NETFILTER_CFG table=nat:45 family=2 entries=2 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:21.096000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd1f8a3b0 a2=0 a3=1 items=0 ppid=2130 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:24:21.132000 audit[2231]: NETFILTER_CFG table=filter:46 family=2 entries=5 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:21.132000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffdc38b890 a2=0 a3=1 items=0 ppid=2130 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:21.152100 kubelet[1873]: E0906 01:24:21.152031 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:21.199000 audit[2231]: NETFILTER_CFG table=nat:47 family=2 entries=79 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:21.199000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=38092 a0=3 a1=ffffdc38b890 a2=0 a3=1 items=0 ppid=2130 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:21.226000 audit[2239]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.226000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc27b9420 a2=0 a3=1 items=0 ppid=2130 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:24:21.230000 audit[2241]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.230000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff6f50ff0 a2=0 a3=1 items=0 ppid=2130 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 01:24:21.235000 audit[2244]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.235000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffbcb6ba0 a2=0 a3=1 items=0 ppid=2130 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 01:24:21.239308 kubelet[1873]: E0906 01:24:21.237966 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:21.246000 audit[2245]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.246000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7bd24e0 a2=0 a3=1 items=0 ppid=2130 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:24:21.252000 audit[2247]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.252000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffc89ad20 a2=0 a3=1 items=0 ppid=2130 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:24:21.253000 audit[2248]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.253000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3e49a30 a2=0 a3=1 items=0 ppid=2130 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:24:21.256000 audit[2250]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.256000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdc6b99b0 a2=0 a3=1 items=0 ppid=2130 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 01:24:21.260000 audit[2253]: NETFILTER_CFG table=filter:55 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.260000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd5be0040 a2=0 a3=1 items=0 ppid=2130 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:24:21.262000 audit[2254]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.262000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcde33ae0 a2=0 a3=1 items=0 ppid=2130 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:24:21.264000 audit[2256]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.264000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffef53e8b0 a2=0 a3=1 items=0 ppid=2130 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:24:21.269000 audit[2257]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.269000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc6e51a0 a2=0 a3=1 items=0 ppid=2130 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:24:21.274000 audit[2259]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.274000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffffc079b0 a2=0 a3=1 items=0 ppid=2130 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:24:21.278000 audit[2262]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.278000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffee999e0 a2=0 a3=1 items=0 ppid=2130 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:24:21.283000 audit[2265]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.283000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2714080 a2=0 a3=1 items=0 ppid=2130 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 01:24:21.285000 audit[2266]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.285000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe3e3dfa0 a2=0 a3=1 items=0 ppid=2130 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:24:21.287000 audit[2268]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.287000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdec455f0 a2=0 a3=1 items=0 ppid=2130 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:21.291000 audit[2271]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.291000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcfd50e10 a2=0 a3=1 items=0 ppid=2130 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:21.293000 audit[2272]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.293000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd95557c0 a2=0 a3=1 items=0 ppid=2130 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:24:21.295000 audit[2274]: NETFILTER_CFG table=nat:66 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.295000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc381bd70 a2=0 a3=1 items=0 ppid=2130 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:24:21.297000 audit[2275]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.297000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe47a3a40 a2=0 a3=1 items=0 ppid=2130 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:24:21.299000 audit[2277]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.299000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe4b50970 a2=0 a3=1 items=0 ppid=2130 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:24:21.303000 audit[2280]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:21.303000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffe2162e0 a2=0 a3=1 items=0 ppid=2130 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:24:21.306000 audit[2282]: NETFILTER_CFG table=filter:70 family=10 entries=3 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:24:21.306000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffdda53070 a2=0 a3=1 items=0 ppid=2130 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.306000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:21.307000 audit[2282]: NETFILTER_CFG table=nat:71 family=10 entries=7 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:24:21.307000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdda53070 a2=0 a3=1 items=0 ppid=2130 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:21.307000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:22.152688 kubelet[1873]: E0906 01:24:22.152646 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:23.153132 kubelet[1873]: E0906 01:24:23.153067 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:23.239183 kubelet[1873]: E0906 01:24:23.238765 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:23.379561 env[1420]: time="2025-09-06T01:24:23.379490961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:23.391921 env[1420]: time="2025-09-06T01:24:23.391868183Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:23.399719 env[1420]: time="2025-09-06T01:24:23.399673917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:23.407545 env[1420]: time="2025-09-06T01:24:23.407507611Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:23.408079 env[1420]: time="2025-09-06T01:24:23.408043132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 6 01:24:23.419053 env[1420]: time="2025-09-06T01:24:23.419001111Z" level=info msg="CreateContainer within sandbox \"a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 01:24:23.461298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1992032790.mount: Deactivated successfully. Sep 6 01:24:23.491424 env[1420]: time="2025-09-06T01:24:23.491369520Z" level=info msg="CreateContainer within sandbox \"a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded\"" Sep 6 01:24:23.492545 env[1420]: time="2025-09-06T01:24:23.492506362Z" level=info msg="StartContainer for \"d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded\"" Sep 6 01:24:23.515132 systemd[1]: run-containerd-runc-k8s.io-d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded-runc.LbZzTR.mount: Deactivated successfully. Sep 6 01:24:23.516667 systemd[1]: Started cri-containerd-d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded.scope. Sep 6 01:24:23.533000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.539728 kernel: kauditd_printk_skb: 346 callbacks suppressed Sep 6 01:24:23.539798 kernel: audit: type=1400 audit(1757121863.533:539): avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.533000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1967 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.584726 kernel: audit: type=1300 audit(1757121863.533:539): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1967 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.585044 kernel: audit: type=1327 audit(1757121863.533:539): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616566306638333434663631316464363034633463633066636630 Sep 6 01:24:23.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616566306638333434663631316464363034633463633066636630 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.628859 kernel: audit: type=1400 audit(1757121863.538:540): avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.649040 kernel: audit: type=1400 audit(1757121863.538:540): avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.667404 kernel: audit: type=1400 audit(1757121863.538:540): avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.685244 kernel: audit: type=1400 audit(1757121863.538:540): avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.703741 kernel: audit: type=1400 audit(1757121863.538:540): avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.722068 kernel: audit: type=1400 audit(1757121863.538:540): avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.722222 kernel: audit: type=1400 audit(1757121863.538:540): avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.722574 env[1420]: time="2025-09-06T01:24:23.722528129Z" level=info msg="StartContainer for \"d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded\" returns successfully" Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.538000 audit: BPF prog-id=76 op=LOAD Sep 6 01:24:23.538000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1967 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616566306638333434663631316464363034633463633066636630 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit: BPF prog-id=77 op=LOAD Sep 6 01:24:23.556000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1967 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616566306638333434663631316464363034633463633066636630 Sep 6 01:24:23.556000 audit: BPF prog-id=77 op=UNLOAD Sep 6 01:24:23.556000 audit: BPF prog-id=76 op=UNLOAD Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:23.556000 audit: BPF prog-id=78 op=LOAD Sep 6 01:24:23.556000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1967 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430616566306638333434663631316464363034633463633066636630 Sep 6 01:24:24.154343 kubelet[1873]: E0906 01:24:24.153510 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:24.300204 kubelet[1873]: I0906 01:24:24.300113 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-vz2sn" podStartSLOduration=9.979408286 podStartE2EDuration="13.300094282s" podCreationTimestamp="2025-09-06 01:24:11 +0000 UTC" firstStartedPulling="2025-09-06 01:24:17.282371129 +0000 UTC m=+7.271650004" lastFinishedPulling="2025-09-06 01:24:20.603057085 +0000 UTC m=+10.592336000" observedRunningTime="2025-09-06 01:24:21.28266763 +0000 UTC m=+11.271946505" watchObservedRunningTime="2025-09-06 01:24:24.300094282 +0000 UTC m=+14.289373197" Sep 6 01:24:25.154125 kubelet[1873]: E0906 01:24:25.154073 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:25.238141 kubelet[1873]: E0906 01:24:25.238086 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:25.829463 env[1420]: time="2025-09-06T01:24:25.829341018Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:24:25.832177 systemd[1]: cri-containerd-d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded.scope: Deactivated successfully. Sep 6 01:24:25.835000 audit: BPF prog-id=78 op=UNLOAD Sep 6 01:24:25.852326 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded-rootfs.mount: Deactivated successfully. Sep 6 01:24:25.946907 kubelet[1873]: I0906 01:24:25.879026 1873 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 01:24:26.155410 kubelet[1873]: E0906 01:24:26.155351 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:26.269708 env[1420]: time="2025-09-06T01:24:26.269652642Z" level=info msg="shim disconnected" id=d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded Sep 6 01:24:26.269708 env[1420]: time="2025-09-06T01:24:26.269709801Z" level=warning msg="cleaning up after shim disconnected" id=d0aef0f8344f611dd604c4cc0fcf011d1529a3d73cbc4735f878ea1482d0dded namespace=k8s.io Sep 6 01:24:26.269927 env[1420]: time="2025-09-06T01:24:26.269721721Z" level=info msg="cleaning up dead shim" Sep 6 01:24:26.279200 env[1420]: time="2025-09-06T01:24:26.279135057Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:24:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2330 runtime=io.containerd.runc.v2\n" Sep 6 01:24:27.156096 kubelet[1873]: E0906 01:24:27.156035 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:27.243097 systemd[1]: Created slice kubepods-besteffort-pod965babbd_7255_47c8_b6e2_f2f770fa68c1.slice. Sep 6 01:24:27.246262 env[1420]: time="2025-09-06T01:24:27.246210961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grx5f,Uid:965babbd-7255-47c8-b6e2-f2f770fa68c1,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:27.281136 env[1420]: time="2025-09-06T01:24:27.281087833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 01:24:27.366193 env[1420]: time="2025-09-06T01:24:27.366114018Z" level=error msg="Failed to destroy network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:27.368274 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03-shm.mount: Deactivated successfully. Sep 6 01:24:27.369937 env[1420]: time="2025-09-06T01:24:27.369882169Z" level=error msg="encountered an error cleaning up failed sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:27.370132 env[1420]: time="2025-09-06T01:24:27.370104208Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grx5f,Uid:965babbd-7255-47c8-b6e2-f2f770fa68c1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:27.370943 kubelet[1873]: E0906 01:24:27.370431 1873 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:27.370943 kubelet[1873]: E0906 01:24:27.370515 1873 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-grx5f" Sep 6 01:24:27.370943 kubelet[1873]: E0906 01:24:27.370549 1873 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-grx5f" Sep 6 01:24:27.371158 kubelet[1873]: E0906 01:24:27.370602 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-grx5f_calico-system(965babbd-7255-47c8-b6e2-f2f770fa68c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-grx5f_calico-system(965babbd-7255-47c8-b6e2-f2f770fa68c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:28.157065 kubelet[1873]: E0906 01:24:28.157014 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:28.283085 kubelet[1873]: I0906 01:24:28.283044 1873 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:24:28.283872 env[1420]: time="2025-09-06T01:24:28.283807239Z" level=info msg="StopPodSandbox for \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\"" Sep 6 01:24:28.308146 env[1420]: time="2025-09-06T01:24:28.308080540Z" level=error msg="StopPodSandbox for \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\" failed" error="failed to destroy network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:28.308723 kubelet[1873]: E0906 01:24:28.308501 1873 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:24:28.308723 kubelet[1873]: E0906 01:24:28.308578 1873 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03"} Sep 6 01:24:28.308723 kubelet[1873]: E0906 01:24:28.308658 1873 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"965babbd-7255-47c8-b6e2-f2f770fa68c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:28.308723 kubelet[1873]: E0906 01:24:28.308692 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"965babbd-7255-47c8-b6e2-f2f770fa68c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-grx5f" podUID="965babbd-7255-47c8-b6e2-f2f770fa68c1" Sep 6 01:24:29.157528 kubelet[1873]: E0906 01:24:29.157467 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:30.157953 kubelet[1873]: E0906 01:24:30.157900 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:31.146815 kubelet[1873]: E0906 01:24:31.146767 1873 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:31.158280 kubelet[1873]: E0906 01:24:31.158243 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:31.559229 systemd[1]: Created slice kubepods-besteffort-podfca746cd_57b7_43f6_be40_ce7b79dd9457.slice. Sep 6 01:24:31.608298 kubelet[1873]: I0906 01:24:31.608223 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b4d5f\" (UniqueName: \"kubernetes.io/projected/fca746cd-57b7-43f6-be40-ce7b79dd9457-kube-api-access-b4d5f\") pod \"nginx-deployment-7fcdb87857-tz5ck\" (UID: \"fca746cd-57b7-43f6-be40-ce7b79dd9457\") " pod="default/nginx-deployment-7fcdb87857-tz5ck" Sep 6 01:24:31.863795 env[1420]: time="2025-09-06T01:24:31.863681417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-tz5ck,Uid:fca746cd-57b7-43f6-be40-ce7b79dd9457,Namespace:default,Attempt:0,}" Sep 6 01:24:32.027954 env[1420]: time="2025-09-06T01:24:32.027888008Z" level=error msg="Failed to destroy network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:32.028544 env[1420]: time="2025-09-06T01:24:32.028498246Z" level=error msg="encountered an error cleaning up failed sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:32.028699 env[1420]: time="2025-09-06T01:24:32.028670806Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-tz5ck,Uid:fca746cd-57b7-43f6-be40-ce7b79dd9457,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:32.031471 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b-shm.mount: Deactivated successfully. Sep 6 01:24:32.032295 kubelet[1873]: E0906 01:24:32.032252 1873 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:32.032408 kubelet[1873]: E0906 01:24:32.032316 1873 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-tz5ck" Sep 6 01:24:32.032408 kubelet[1873]: E0906 01:24:32.032339 1873 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-tz5ck" Sep 6 01:24:32.032408 kubelet[1873]: E0906 01:24:32.032384 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-tz5ck_default(fca746cd-57b7-43f6-be40-ce7b79dd9457)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-tz5ck_default(fca746cd-57b7-43f6-be40-ce7b79dd9457)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-tz5ck" podUID="fca746cd-57b7-43f6-be40-ce7b79dd9457" Sep 6 01:24:32.159592 kubelet[1873]: E0906 01:24:32.159541 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:32.289151 kubelet[1873]: I0906 01:24:32.289109 1873 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:24:32.289913 env[1420]: time="2025-09-06T01:24:32.289862552Z" level=info msg="StopPodSandbox for \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\"" Sep 6 01:24:32.335696 env[1420]: time="2025-09-06T01:24:32.335629291Z" level=error msg="StopPodSandbox for \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\" failed" error="failed to destroy network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:32.336277 kubelet[1873]: E0906 01:24:32.336125 1873 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:24:32.336277 kubelet[1873]: E0906 01:24:32.336187 1873 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b"} Sep 6 01:24:32.336277 kubelet[1873]: E0906 01:24:32.336220 1873 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fca746cd-57b7-43f6-be40-ce7b79dd9457\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:32.336277 kubelet[1873]: E0906 01:24:32.336243 1873 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fca746cd-57b7-43f6-be40-ce7b79dd9457\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-tz5ck" podUID="fca746cd-57b7-43f6-be40-ce7b79dd9457" Sep 6 01:24:32.459010 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount904830248.mount: Deactivated successfully. Sep 6 01:24:32.523145 env[1420]: time="2025-09-06T01:24:32.523080959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:32.532694 env[1420]: time="2025-09-06T01:24:32.532630818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:32.538442 env[1420]: time="2025-09-06T01:24:32.538398886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:32.544941 env[1420]: time="2025-09-06T01:24:32.544897591Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:32.545562 env[1420]: time="2025-09-06T01:24:32.545521630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 6 01:24:32.560283 env[1420]: time="2025-09-06T01:24:32.560235518Z" level=info msg="CreateContainer within sandbox \"a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 01:24:32.610395 env[1420]: time="2025-09-06T01:24:32.610333368Z" level=info msg="CreateContainer within sandbox \"a3b88f77d6edcbacc456ead841261971be25733bfa97ef12d6c98b3158ab6bf6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"25aa79bd40a5320ffd8bc164ca51399cf134e890737f52a3c41c6663393c1a06\"" Sep 6 01:24:32.611263 env[1420]: time="2025-09-06T01:24:32.611227606Z" level=info msg="StartContainer for \"25aa79bd40a5320ffd8bc164ca51399cf134e890737f52a3c41c6663393c1a06\"" Sep 6 01:24:32.628527 systemd[1]: Started cri-containerd-25aa79bd40a5320ffd8bc164ca51399cf134e890737f52a3c41c6663393c1a06.scope. Sep 6 01:24:32.670780 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 01:24:32.670931 kernel: audit: type=1400 audit(1757121872.646:546): avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1967 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:32.697137 kernel: audit: type=1300 audit(1757121872.646:546): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1967 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:32.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616137396264343061353332306666643862633136346361353133 Sep 6 01:24:32.722582 kernel: audit: type=1327 audit(1757121872.646:546): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616137396264343061353332306666643862633136346361353133 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.762730 kernel: audit: type=1400 audit(1757121872.646:547): avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.762865 kernel: audit: type=1400 audit(1757121872.646:547): avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.801300 kernel: audit: type=1400 audit(1757121872.646:547): avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.801424 kernel: audit: type=1400 audit(1757121872.646:547): avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.820658 kernel: audit: type=1400 audit(1757121872.646:547): avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.840266 kernel: audit: type=1400 audit(1757121872.646:547): avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.859004 kernel: audit: type=1400 audit(1757121872.646:547): avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.859121 env[1420]: time="2025-09-06T01:24:32.840633502Z" level=info msg="StartContainer for \"25aa79bd40a5320ffd8bc164ca51399cf134e890737f52a3c41c6663393c1a06\" returns successfully" Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.646000 audit: BPF prog-id=79 op=LOAD Sep 6 01:24:32.646000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1967 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:32.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616137396264343061353332306666643862633136346361353133 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.652000 audit: BPF prog-id=80 op=LOAD Sep 6 01:24:32.652000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1967 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:32.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616137396264343061353332306666643862633136346361353133 Sep 6 01:24:32.669000 audit: BPF prog-id=80 op=UNLOAD Sep 6 01:24:32.669000 audit: BPF prog-id=79 op=UNLOAD Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:32.669000 audit: BPF prog-id=81 op=LOAD Sep 6 01:24:32.669000 audit[2437]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1967 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:32.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616137396264343061353332306666643862633136346361353133 Sep 6 01:24:33.037251 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 01:24:33.037397 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 01:24:33.160721 kubelet[1873]: E0906 01:24:33.160659 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:33.312234 kubelet[1873]: I0906 01:24:33.312169 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zhjzh" podStartSLOduration=7.025366327 podStartE2EDuration="22.312154324s" podCreationTimestamp="2025-09-06 01:24:11 +0000 UTC" firstStartedPulling="2025-09-06 01:24:17.25996667 +0000 UTC m=+7.249245585" lastFinishedPulling="2025-09-06 01:24:32.546754667 +0000 UTC m=+22.536033582" observedRunningTime="2025-09-06 01:24:33.311933724 +0000 UTC m=+23.301212639" watchObservedRunningTime="2025-09-06 01:24:33.312154324 +0000 UTC m=+23.301433239" Sep 6 01:24:34.161775 kubelet[1873]: E0906 01:24:34.161733 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:34.339000 audit[2534]: AVC avc: denied { write } for pid=2534 comm="tee" name="fd" dev="proc" ino=17796 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:34.339000 audit[2534]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd4c497d7 a2=241 a3=1b6 items=1 ppid=2500 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.339000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 01:24:34.339000 audit: PATH item=0 name="/dev/fd/63" inode=18596 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:34.339000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:34.342000 audit[2537]: AVC avc: denied { write } for pid=2537 comm="tee" name="fd" dev="proc" ino=17803 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:34.342000 audit[2537]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcab007d7 a2=241 a3=1b6 items=1 ppid=2521 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.342000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 01:24:34.342000 audit: PATH item=0 name="/dev/fd/63" inode=17791 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:34.342000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:34.344000 audit[2539]: AVC avc: denied { write } for pid=2539 comm="tee" name="fd" dev="proc" ino=17807 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:34.344000 audit[2539]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed08d7d8 a2=241 a3=1b6 items=1 ppid=2516 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.344000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 01:24:34.344000 audit: PATH item=0 name="/dev/fd/63" inode=17792 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:34.344000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:34.346000 audit[2542]: AVC avc: denied { write } for pid=2542 comm="tee" name="fd" dev="proc" ino=17811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:34.346000 audit[2542]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff76517d7 a2=241 a3=1b6 items=1 ppid=2501 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.346000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 01:24:34.346000 audit: PATH item=0 name="/dev/fd/63" inode=17793 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:34.346000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:34.350000 audit[2550]: AVC avc: denied { write } for pid=2550 comm="tee" name="fd" dev="proc" ino=17817 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:34.350000 audit[2550]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe989e7c7 a2=241 a3=1b6 items=1 ppid=2514 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.350000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 01:24:34.350000 audit: PATH item=0 name="/dev/fd/63" inode=18599 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:34.350000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:34.352000 audit[2558]: AVC avc: denied { write } for pid=2558 comm="tee" name="fd" dev="proc" ino=17821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:34.352000 audit[2558]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe72ea7d9 a2=241 a3=1b6 items=1 ppid=2511 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.352000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 01:24:34.352000 audit: PATH item=0 name="/dev/fd/63" inode=18602 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:34.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:34.354000 audit[2547]: AVC avc: denied { write } for pid=2547 comm="tee" name="fd" dev="proc" ino=17825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:34.354000 audit[2547]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2cf77c8 a2=241 a3=1b6 items=1 ppid=2520 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.354000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 01:24:34.354000 audit: PATH item=0 name="/dev/fd/63" inode=17798 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:34.354000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit: BPF prog-id=82 op=LOAD Sep 6 01:24:34.573000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0f007c8 a2=98 a3=ffffd0f007b8 items=0 ppid=2524 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.573000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:34.573000 audit: BPF prog-id=82 op=UNLOAD Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit: BPF prog-id=83 op=LOAD Sep 6 01:24:34.573000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0f00678 a2=74 a3=95 items=0 ppid=2524 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.573000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:34.573000 audit: BPF prog-id=83 op=UNLOAD Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit: BPF prog-id=84 op=LOAD Sep 6 01:24:34.573000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0f006a8 a2=40 a3=ffffd0f006d8 items=0 ppid=2524 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.573000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:34.573000 audit: BPF prog-id=84 op=UNLOAD Sep 6 01:24:34.573000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.573000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd0f007c0 a2=50 a3=0 items=0 ppid=2524 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.573000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.577000 audit: BPF prog-id=85 op=LOAD Sep 6 01:24:34.577000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffed96808 a2=98 a3=fffffed967f8 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.579000 audit: BPF prog-id=85 op=UNLOAD Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.580000 audit: BPF prog-id=86 op=LOAD Sep 6 01:24:34.580000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffed96498 a2=74 a3=95 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.581000 audit: BPF prog-id=86 op=UNLOAD Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.581000 audit: BPF prog-id=87 op=LOAD Sep 6 01:24:34.581000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffed964f8 a2=94 a3=2 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.582000 audit: BPF prog-id=87 op=UNLOAD Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit: BPF prog-id=88 op=LOAD Sep 6 01:24:34.677000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffed964b8 a2=40 a3=fffffed964e8 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.677000 audit: BPF prog-id=88 op=UNLOAD Sep 6 01:24:34.677000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.677000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffed965d0 a2=50 a3=0 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffed96528 a2=28 a3=fffffed96658 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffed96558 a2=28 a3=fffffed96688 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffed96408 a2=28 a3=fffffed96538 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffed96578 a2=28 a3=fffffed966a8 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffed96558 a2=28 a3=fffffed96688 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffed96548 a2=28 a3=fffffed96678 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffed96578 a2=28 a3=fffffed966a8 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffed96558 a2=28 a3=fffffed96688 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffed96578 a2=28 a3=fffffed966a8 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffed96548 a2=28 a3=fffffed96678 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffed965c8 a2=28 a3=fffffed96708 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffed96300 a2=50 a3=0 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit: BPF prog-id=89 op=LOAD Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffed96308 a2=94 a3=5 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit: BPF prog-id=89 op=UNLOAD Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffed96410 a2=50 a3=0 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffed96558 a2=4 a3=3 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.686000 audit[2609]: AVC avc: denied { confidentiality } for pid=2609 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:34.686000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffed96538 a2=94 a3=6 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { confidentiality } for pid=2609 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:34.687000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffed95d08 a2=94 a3=83 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.687000 audit[2609]: AVC avc: denied { confidentiality } for pid=2609 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:34.687000 audit[2609]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffed95d08 a2=94 a3=83 items=0 ppid=2524 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.697000 audit: BPF prog-id=90 op=LOAD Sep 6 01:24:34.697000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe4b44f08 a2=98 a3=ffffe4b44ef8 items=0 ppid=2524 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.697000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:24:34.698000 audit: BPF prog-id=90 op=UNLOAD Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit: BPF prog-id=91 op=LOAD Sep 6 01:24:34.698000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe4b44db8 a2=74 a3=95 items=0 ppid=2524 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.698000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:24:34.698000 audit: BPF prog-id=91 op=UNLOAD Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.698000 audit: BPF prog-id=92 op=LOAD Sep 6 01:24:34.698000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe4b44de8 a2=40 a3=ffffe4b44e18 items=0 ppid=2524 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.698000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:24:34.699000 audit: BPF prog-id=92 op=UNLOAD Sep 6 01:24:34.797187 systemd-networkd[1566]: vxlan.calico: Link UP Sep 6 01:24:34.797201 systemd-networkd[1566]: vxlan.calico: Gained carrier Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit: BPF prog-id=93 op=LOAD Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc1a3208 a2=98 a3=fffffc1a31f8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit: BPF prog-id=93 op=UNLOAD Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit: BPF prog-id=94 op=LOAD Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc1a2ee8 a2=74 a3=95 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit: BPF prog-id=94 op=UNLOAD Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit: BPF prog-id=95 op=LOAD Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc1a2f48 a2=94 a3=2 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit: BPF prog-id=95 op=UNLOAD Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffc1a2f78 a2=28 a3=fffffc1a30a8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc1a2fa8 a2=28 a3=fffffc1a30d8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc1a2e58 a2=28 a3=fffffc1a2f88 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffc1a2fc8 a2=28 a3=fffffc1a30f8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffc1a2fa8 a2=28 a3=fffffc1a30d8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.824000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.824000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffc1a2f98 a2=28 a3=fffffc1a30c8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffc1a2fc8 a2=28 a3=fffffc1a30f8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc1a2fa8 a2=28 a3=fffffc1a30d8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc1a2fc8 a2=28 a3=fffffc1a30f8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffc1a2f98 a2=28 a3=fffffc1a30c8 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffc1a3018 a2=28 a3=fffffc1a3158 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit: BPF prog-id=96 op=LOAD Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffc1a2e38 a2=40 a3=fffffc1a2e68 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit: BPF prog-id=96 op=UNLOAD Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffffc1a2e60 a2=50 a3=0 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffffc1a2e60 a2=50 a3=0 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit: BPF prog-id=97 op=LOAD Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffc1a25c8 a2=94 a3=2 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.830000 audit: BPF prog-id=97 op=UNLOAD Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.830000 audit: BPF prog-id=98 op=LOAD Sep 6 01:24:34.830000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffc1a2758 a2=94 a3=30 items=0 ppid=2524 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.836000 audit: BPF prog-id=99 op=LOAD Sep 6 01:24:34.836000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcab14c58 a2=98 a3=ffffcab14c48 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.836000 audit: BPF prog-id=99 op=UNLOAD Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit: BPF prog-id=100 op=LOAD Sep 6 01:24:34.837000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcab148e8 a2=74 a3=95 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.837000 audit: BPF prog-id=100 op=UNLOAD Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.837000 audit: BPF prog-id=101 op=LOAD Sep 6 01:24:34.837000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcab14948 a2=94 a3=2 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.837000 audit: BPF prog-id=101 op=UNLOAD Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit: BPF prog-id=102 op=LOAD Sep 6 01:24:34.942000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcab14908 a2=40 a3=ffffcab14938 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.942000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.942000 audit: BPF prog-id=102 op=UNLOAD Sep 6 01:24:34.942000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.942000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcab14a20 a2=50 a3=0 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.942000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcab14978 a2=28 a3=ffffcab14aa8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcab149a8 a2=28 a3=ffffcab14ad8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcab14858 a2=28 a3=ffffcab14988 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcab149c8 a2=28 a3=ffffcab14af8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcab149a8 a2=28 a3=ffffcab14ad8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcab14998 a2=28 a3=ffffcab14ac8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcab149c8 a2=28 a3=ffffcab14af8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcab149a8 a2=28 a3=ffffcab14ad8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcab149c8 a2=28 a3=ffffcab14af8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.951000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.951000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcab14998 a2=28 a3=ffffcab14ac8 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcab14a18 a2=28 a3=ffffcab14b58 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcab14750 a2=50 a3=0 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit: BPF prog-id=103 op=LOAD Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcab14758 a2=94 a3=5 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit: BPF prog-id=103 op=UNLOAD Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcab14860 a2=50 a3=0 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcab149a8 a2=4 a3=3 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { confidentiality } for pid=2642 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcab14988 a2=94 a3=6 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { confidentiality } for pid=2642 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcab14158 a2=94 a3=83 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.952000 audit[2642]: AVC avc: denied { confidentiality } for pid=2642 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:34.952000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcab14158 a2=94 a3=83 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.953000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.953000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcab15b98 a2=10 a3=ffffcab15c88 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.953000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.953000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcab15a58 a2=10 a3=ffffcab15b48 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.953000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.953000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcab159c8 a2=10 a3=ffffcab15b48 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.953000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:34.953000 audit[2642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcab159c8 a2=10 a3=ffffcab15b48 items=0 ppid=2524 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:34.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:34.962000 audit: BPF prog-id=98 op=UNLOAD Sep 6 01:24:35.074000 audit[2668]: NETFILTER_CFG table=mangle:72 family=2 entries=16 op=nft_register_chain pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:35.074000 audit[2668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc4ee78f0 a2=0 a3=ffff9cfaffa8 items=0 ppid=2524 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:35.074000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:35.080000 audit[2667]: NETFILTER_CFG table=nat:73 family=2 entries=15 op=nft_register_chain pid=2667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:35.080000 audit[2667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd60bd640 a2=0 a3=ffff8b403fa8 items=0 ppid=2524 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:35.080000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:35.110000 audit[2669]: NETFILTER_CFG table=filter:74 family=2 entries=39 op=nft_register_chain pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:35.110000 audit[2669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe9b78610 a2=0 a3=ffff7f8f2fa8 items=0 ppid=2524 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:35.110000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:35.126000 audit[2666]: NETFILTER_CFG table=raw:75 family=2 entries=21 op=nft_register_chain pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:35.126000 audit[2666]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe1d26930 a2=0 a3=ffffb4d90fa8 items=0 ppid=2524 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:35.126000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:35.162008 kubelet[1873]: E0906 01:24:35.161951 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:36.162534 kubelet[1873]: E0906 01:24:36.162487 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:36.714131 systemd-networkd[1566]: vxlan.calico: Gained IPv6LL Sep 6 01:24:37.162844 kubelet[1873]: E0906 01:24:37.162812 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:38.163708 kubelet[1873]: E0906 01:24:38.163662 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:39.164960 kubelet[1873]: E0906 01:24:39.164922 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:40.166183 kubelet[1873]: E0906 01:24:40.166120 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:41.167038 kubelet[1873]: E0906 01:24:41.166967 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:41.808336 kubelet[1873]: I0906 01:24:41.807888 1873 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 01:24:41.828830 systemd[1]: run-containerd-runc-k8s.io-25aa79bd40a5320ffd8bc164ca51399cf134e890737f52a3c41c6663393c1a06-runc.RysJse.mount: Deactivated successfully. Sep 6 01:24:42.167701 kubelet[1873]: E0906 01:24:42.167666 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:42.238733 env[1420]: time="2025-09-06T01:24:42.238692682Z" level=info msg="StopPodSandbox for \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\"" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.291 [INFO][2740] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.293 [INFO][2740] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" iface="eth0" netns="/var/run/netns/cni-1673c2ba-f15d-50e4-aa5d-7f3eed89db5d" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.294 [INFO][2740] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" iface="eth0" netns="/var/run/netns/cni-1673c2ba-f15d-50e4-aa5d-7f3eed89db5d" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.294 [INFO][2740] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" iface="eth0" netns="/var/run/netns/cni-1673c2ba-f15d-50e4-aa5d-7f3eed89db5d" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.294 [INFO][2740] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.294 [INFO][2740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.318 [INFO][2747] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.318 [INFO][2747] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.318 [INFO][2747] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.328 [WARNING][2747] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.328 [INFO][2747] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.329 [INFO][2747] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:42.333561 env[1420]: 2025-09-06 01:24:42.331 [INFO][2740] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:24:42.336457 env[1420]: time="2025-09-06T01:24:42.333710563Z" level=info msg="TearDown network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\" successfully" Sep 6 01:24:42.336457 env[1420]: time="2025-09-06T01:24:42.333753563Z" level=info msg="StopPodSandbox for \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\" returns successfully" Sep 6 01:24:42.336457 env[1420]: time="2025-09-06T01:24:42.334559162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grx5f,Uid:965babbd-7255-47c8-b6e2-f2f770fa68c1,Namespace:calico-system,Attempt:1,}" Sep 6 01:24:42.337806 systemd[1]: run-netns-cni\x2d1673c2ba\x2df15d\x2d50e4\x2daa5d\x2d7f3eed89db5d.mount: Deactivated successfully. Sep 6 01:24:42.499465 systemd-networkd[1566]: cali452f7017ade: Link UP Sep 6 01:24:42.514839 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:24:42.514950 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali452f7017ade: link becomes ready Sep 6 01:24:42.516953 systemd-networkd[1566]: cali452f7017ade: Gained carrier Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.430 [INFO][2753] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.40-k8s-csi--node--driver--grx5f-eth0 csi-node-driver- calico-system 965babbd-7255-47c8-b6e2-f2f770fa68c1 1411 0 2025-09-06 01:24:11 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.40 csi-node-driver-grx5f eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali452f7017ade [] [] }} ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.430 [INFO][2753] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.456 [INFO][2766] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" HandleID="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.456 [INFO][2766] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" HandleID="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.40", "pod":"csi-node-driver-grx5f", "timestamp":"2025-09-06 01:24:42.456316357 +0000 UTC"}, Hostname:"10.200.20.40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.456 [INFO][2766] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.456 [INFO][2766] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.456 [INFO][2766] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.40' Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.466 [INFO][2766] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.470 [INFO][2766] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.474 [INFO][2766] ipam/ipam.go 511: Trying affinity for 192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.475 [INFO][2766] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.477 [INFO][2766] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.477 [INFO][2766] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.64/26 handle="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.478 [INFO][2766] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.486 [INFO][2766] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.64/26 handle="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.492 [INFO][2766] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.65/26] block=192.168.71.64/26 handle="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.492 [INFO][2766] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.65/26] handle="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" host="10.200.20.40" Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.492 [INFO][2766] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:42.542848 env[1420]: 2025-09-06 01:24:42.492 [INFO][2766] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.65/26] IPv6=[] ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" HandleID="k8s-pod-network.26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.543487 env[1420]: 2025-09-06 01:24:42.494 [INFO][2753] cni-plugin/k8s.go 418: Populated endpoint ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-csi--node--driver--grx5f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"965babbd-7255-47c8-b6e2-f2f770fa68c1", ResourceVersion:"1411", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"", Pod:"csi-node-driver-grx5f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali452f7017ade", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:42.543487 env[1420]: 2025-09-06 01:24:42.494 [INFO][2753] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.65/32] ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.543487 env[1420]: 2025-09-06 01:24:42.494 [INFO][2753] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali452f7017ade ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.543487 env[1420]: 2025-09-06 01:24:42.515 [INFO][2753] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.543487 env[1420]: 2025-09-06 01:24:42.516 [INFO][2753] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-csi--node--driver--grx5f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"965babbd-7255-47c8-b6e2-f2f770fa68c1", ResourceVersion:"1411", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f", Pod:"csi-node-driver-grx5f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali452f7017ade", MAC:"aa:6a:e6:6e:eb:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:42.543487 env[1420]: 2025-09-06 01:24:42.541 [INFO][2753] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f" Namespace="calico-system" Pod="csi-node-driver-grx5f" WorkloadEndpoint="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:24:42.561644 env[1420]: time="2025-09-06T01:24:42.561561781Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:42.561865 env[1420]: time="2025-09-06T01:24:42.561839740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:42.561950 env[1420]: time="2025-09-06T01:24:42.561930540Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:42.562314 env[1420]: time="2025-09-06T01:24:42.562272339Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f pid=2791 runtime=io.containerd.runc.v2 Sep 6 01:24:42.576144 systemd[1]: Started cri-containerd-26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f.scope. Sep 6 01:24:42.616062 kernel: kauditd_printk_skb: 596 callbacks suppressed Sep 6 01:24:42.616206 kernel: audit: type=1400 audit(1757121882.591:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.635164 kernel: audit: type=1400 audit(1757121882.591:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.671803 kernel: audit: type=1400 audit(1757121882.591:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.671952 kernel: audit: type=1400 audit(1757121882.591:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.690676 kernel: audit: type=1400 audit(1757121882.591:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.693194 kernel: audit: type=1400 audit(1757121882.591:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.711663 env[1420]: time="2025-09-06T01:24:42.711621409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grx5f,Uid:965babbd-7255-47c8-b6e2-f2f770fa68c1,Namespace:calico-system,Attempt:1,} returns sandbox id \"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f\"" Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.730032 kernel: audit: type=1400 audit(1757121882.591:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.732064 env[1420]: time="2025-09-06T01:24:42.732027134Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 01:24:42.748402 kernel: audit: type=1400 audit(1757121882.591:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.765567 kernel: audit: type=1400 audit(1757121882.591:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.765821 kernel: audit: type=1400 audit(1757121882.591:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.591000 audit: BPF prog-id=104 op=LOAD Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2791 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:42.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653033356139363238643966313765646435373565393936633333 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2791 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:42.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653033356139363238643966313765646435373565393936633333 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.603000 audit: BPF prog-id=105 op=LOAD Sep 6 01:24:42.603000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2791 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:42.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653033356139363238643966313765646435373565393936633333 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit: BPF prog-id=106 op=LOAD Sep 6 01:24:42.615000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2791 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:42.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653033356139363238643966313765646435373565393936633333 Sep 6 01:24:42.615000 audit: BPF prog-id=106 op=UNLOAD Sep 6 01:24:42.615000 audit: BPF prog-id=105 op=UNLOAD Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:42.615000 audit: BPF prog-id=107 op=LOAD Sep 6 01:24:42.615000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2791 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:42.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653033356139363238643966313765646435373565393936633333 Sep 6 01:24:42.566000 audit[2787]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:42.566000 audit[2787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffff70e480 a2=0 a3=ffff8b9b6fa8 items=0 ppid=2524 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:42.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:43.167987 kubelet[1873]: E0906 01:24:43.167940 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:44.047352 env[1420]: time="2025-09-06T01:24:44.047300214Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:44.058085 env[1420]: time="2025-09-06T01:24:44.058032477Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:44.064180 env[1420]: time="2025-09-06T01:24:44.064134987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:44.071436 env[1420]: time="2025-09-06T01:24:44.071392456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:44.071960 env[1420]: time="2025-09-06T01:24:44.071926855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 6 01:24:44.085768 env[1420]: time="2025-09-06T01:24:44.085723073Z" level=info msg="CreateContainer within sandbox \"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 01:24:44.128817 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1355512744.mount: Deactivated successfully. Sep 6 01:24:44.152201 env[1420]: time="2025-09-06T01:24:44.152141527Z" level=info msg="CreateContainer within sandbox \"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2746b50fba03636af8c11162ab1cb447932c762dcc3a4243ac44b0acedf7a48c\"" Sep 6 01:24:44.153316 env[1420]: time="2025-09-06T01:24:44.153277005Z" level=info msg="StartContainer for \"2746b50fba03636af8c11162ab1cb447932c762dcc3a4243ac44b0acedf7a48c\"" Sep 6 01:24:44.169000 kubelet[1873]: E0906 01:24:44.168940 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:44.179182 systemd[1]: Started cri-containerd-2746b50fba03636af8c11162ab1cb447932c762dcc3a4243ac44b0acedf7a48c.scope. Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2791 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343662353066626130333633366166386331313136326162316362 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.193000 audit: BPF prog-id=108 op=LOAD Sep 6 01:24:44.193000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2791 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343662353066626130333633366166386331313136326162316362 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.194000 audit: BPF prog-id=109 op=LOAD Sep 6 01:24:44.194000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2791 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343662353066626130333633366166386331313136326162316362 Sep 6 01:24:44.194000 audit: BPF prog-id=109 op=UNLOAD Sep 6 01:24:44.194000 audit: BPF prog-id=108 op=UNLOAD Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.195000 audit: BPF prog-id=110 op=LOAD Sep 6 01:24:44.195000 audit[2835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2791 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343662353066626130333633366166386331313136326162316362 Sep 6 01:24:44.221833 env[1420]: time="2025-09-06T01:24:44.221780496Z" level=info msg="StartContainer for \"2746b50fba03636af8c11162ab1cb447932c762dcc3a4243ac44b0acedf7a48c\" returns successfully" Sep 6 01:24:44.223650 env[1420]: time="2025-09-06T01:24:44.223600213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 01:24:44.238765 env[1420]: time="2025-09-06T01:24:44.238723589Z" level=info msg="StopPodSandbox for \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\"" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.288 [INFO][2870] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.288 [INFO][2870] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" iface="eth0" netns="/var/run/netns/cni-6bdeb381-3b05-4c21-0f26-e58e1de12737" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.288 [INFO][2870] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" iface="eth0" netns="/var/run/netns/cni-6bdeb381-3b05-4c21-0f26-e58e1de12737" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.288 [INFO][2870] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" iface="eth0" netns="/var/run/netns/cni-6bdeb381-3b05-4c21-0f26-e58e1de12737" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.288 [INFO][2870] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.288 [INFO][2870] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.309 [INFO][2878] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.310 [INFO][2878] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.310 [INFO][2878] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.325 [WARNING][2878] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.325 [INFO][2878] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.352 [INFO][2878] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:44.357410 env[1420]: 2025-09-06 01:24:44.354 [INFO][2870] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:24:44.357683 systemd[1]: run-netns-cni\x2d6bdeb381\x2d3b05\x2d4c21\x2d0f26\x2de58e1de12737.mount: Deactivated successfully. Sep 6 01:24:44.358582 env[1420]: time="2025-09-06T01:24:44.358474958Z" level=info msg="TearDown network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\" successfully" Sep 6 01:24:44.358582 env[1420]: time="2025-09-06T01:24:44.358532958Z" level=info msg="StopPodSandbox for \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\" returns successfully" Sep 6 01:24:44.359512 env[1420]: time="2025-09-06T01:24:44.359470277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-tz5ck,Uid:fca746cd-57b7-43f6-be40-ce7b79dd9457,Namespace:default,Attempt:1,}" Sep 6 01:24:44.522636 systemd-networkd[1566]: cali452f7017ade: Gained IPv6LL Sep 6 01:24:44.545939 systemd-networkd[1566]: cali9e80ee37dd0: Link UP Sep 6 01:24:44.559157 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:24:44.559282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9e80ee37dd0: link becomes ready Sep 6 01:24:44.565505 systemd-networkd[1566]: cali9e80ee37dd0: Gained carrier Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.473 [INFO][2885] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0 nginx-deployment-7fcdb87857- default fca746cd-57b7-43f6-be40-ce7b79dd9457 1425 0 2025-09-06 01:24:31 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.40 nginx-deployment-7fcdb87857-tz5ck eth0 default [] [] [kns.default ksa.default.default] cali9e80ee37dd0 [] [] }} ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.473 [INFO][2885] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.497 [INFO][2897] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" HandleID="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.498 [INFO][2897] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" HandleID="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003234b0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.40", "pod":"nginx-deployment-7fcdb87857-tz5ck", "timestamp":"2025-09-06 01:24:44.497887536 +0000 UTC"}, Hostname:"10.200.20.40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.498 [INFO][2897] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.498 [INFO][2897] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.498 [INFO][2897] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.40' Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.507 [INFO][2897] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.511 [INFO][2897] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.516 [INFO][2897] ipam/ipam.go 511: Trying affinity for 192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.517 [INFO][2897] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.519 [INFO][2897] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.519 [INFO][2897] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.64/26 handle="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.521 [INFO][2897] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.526 [INFO][2897] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.64/26 handle="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.540 [INFO][2897] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.66/26] block=192.168.71.64/26 handle="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.540 [INFO][2897] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.66/26] handle="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" host="10.200.20.40" Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.540 [INFO][2897] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:44.581961 env[1420]: 2025-09-06 01:24:44.540 [INFO][2897] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.66/26] IPv6=[] ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" HandleID="k8s-pod-network.948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.582616 env[1420]: 2025-09-06 01:24:44.542 [INFO][2885] cni-plugin/k8s.go 418: Populated endpoint ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"fca746cd-57b7-43f6-be40-ce7b79dd9457", ResourceVersion:"1425", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-tz5ck", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9e80ee37dd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:44.582616 env[1420]: 2025-09-06 01:24:44.542 [INFO][2885] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.66/32] ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.582616 env[1420]: 2025-09-06 01:24:44.542 [INFO][2885] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9e80ee37dd0 ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.582616 env[1420]: 2025-09-06 01:24:44.563 [INFO][2885] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.582616 env[1420]: 2025-09-06 01:24:44.567 [INFO][2885] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"fca746cd-57b7-43f6-be40-ce7b79dd9457", ResourceVersion:"1425", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d", Pod:"nginx-deployment-7fcdb87857-tz5ck", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9e80ee37dd0", MAC:"92:17:78:d2:07:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:44.582616 env[1420]: 2025-09-06 01:24:44.580 [INFO][2885] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d" Namespace="default" Pod="nginx-deployment-7fcdb87857-tz5ck" WorkloadEndpoint="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:24:44.601000 audit[2920]: NETFILTER_CFG table=filter:77 family=2 entries=42 op=nft_register_chain pid=2920 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:44.602961 env[1420]: time="2025-09-06T01:24:44.601320132Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:44.602961 env[1420]: time="2025-09-06T01:24:44.601371811Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:44.602961 env[1420]: time="2025-09-06T01:24:44.601383091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:44.602961 env[1420]: time="2025-09-06T01:24:44.601503691Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d pid=2921 runtime=io.containerd.runc.v2 Sep 6 01:24:44.601000 audit[2920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffe8f7c420 a2=0 a3=ffffbcdd8fa8 items=0 ppid=2524 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:44.614405 systemd[1]: Started cri-containerd-948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d.scope. Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.630000 audit: BPF prog-id=111 op=LOAD Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2921 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386332393433616661633935336461646433323764643561353730 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2921 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386332393433616661633935336461646433323764643561353730 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit: BPF prog-id=112 op=LOAD Sep 6 01:24:44.631000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2921 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386332393433616661633935336461646433323764643561353730 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit: BPF prog-id=113 op=LOAD Sep 6 01:24:44.631000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2921 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386332393433616661633935336461646433323764643561353730 Sep 6 01:24:44.631000 audit: BPF prog-id=113 op=UNLOAD Sep 6 01:24:44.631000 audit: BPF prog-id=112 op=UNLOAD Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:44.631000 audit: BPF prog-id=114 op=LOAD Sep 6 01:24:44.631000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2921 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:44.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386332393433616661633935336461646433323764643561353730 Sep 6 01:24:44.652920 env[1420]: time="2025-09-06T01:24:44.652877289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-tz5ck,Uid:fca746cd-57b7-43f6-be40-ce7b79dd9457,Namespace:default,Attempt:1,} returns sandbox id \"948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d\"" Sep 6 01:24:45.169277 kubelet[1873]: E0906 01:24:45.169207 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:45.658784 env[1420]: time="2025-09-06T01:24:45.658732234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:45.674474 env[1420]: time="2025-09-06T01:24:45.674412690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:45.679776 env[1420]: time="2025-09-06T01:24:45.679736121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:45.688894 env[1420]: time="2025-09-06T01:24:45.688734467Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:45.689827 env[1420]: time="2025-09-06T01:24:45.689787826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 6 01:24:45.692832 env[1420]: time="2025-09-06T01:24:45.692743341Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 01:24:45.698509 env[1420]: time="2025-09-06T01:24:45.698469212Z" level=info msg="CreateContainer within sandbox \"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 01:24:45.766236 env[1420]: time="2025-09-06T01:24:45.766170147Z" level=info msg="CreateContainer within sandbox \"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f9b1e9f1c5dc6f6771084c7b5e2863ed9ad1418e12415d6d94a29258e5a9eb23\"" Sep 6 01:24:45.766824 env[1420]: time="2025-09-06T01:24:45.766787746Z" level=info msg="StartContainer for \"f9b1e9f1c5dc6f6771084c7b5e2863ed9ad1418e12415d6d94a29258e5a9eb23\"" Sep 6 01:24:45.790780 systemd[1]: run-containerd-runc-k8s.io-f9b1e9f1c5dc6f6771084c7b5e2863ed9ad1418e12415d6d94a29258e5a9eb23-runc.sHLW1s.mount: Deactivated successfully. Sep 6 01:24:45.792712 systemd[1]: Started cri-containerd-f9b1e9f1c5dc6f6771084c7b5e2863ed9ad1418e12415d6d94a29258e5a9eb23.scope. Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2791 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:45.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623165396631633564633666363737313038346337623565323836 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit: BPF prog-id=115 op=LOAD Sep 6 01:24:45.808000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2791 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:45.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623165396631633564633666363737313038346337623565323836 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit: BPF prog-id=116 op=LOAD Sep 6 01:24:45.808000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2791 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:45.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623165396631633564633666363737313038346337623565323836 Sep 6 01:24:45.808000 audit: BPF prog-id=116 op=UNLOAD Sep 6 01:24:45.808000 audit: BPF prog-id=115 op=UNLOAD Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:45.808000 audit: BPF prog-id=117 op=LOAD Sep 6 01:24:45.808000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2791 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:45.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623165396631633564633666363737313038346337623565323836 Sep 6 01:24:45.831243 env[1420]: time="2025-09-06T01:24:45.831187966Z" level=info msg="StartContainer for \"f9b1e9f1c5dc6f6771084c7b5e2863ed9ad1418e12415d6d94a29258e5a9eb23\" returns successfully" Sep 6 01:24:46.170214 kubelet[1873]: E0906 01:24:46.170178 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:46.263144 kubelet[1873]: I0906 01:24:46.263021 1873 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 01:24:46.263144 kubelet[1873]: I0906 01:24:46.263054 1873 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 01:24:46.337666 kubelet[1873]: I0906 01:24:46.337586 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-grx5f" podStartSLOduration=32.377826745 podStartE2EDuration="35.337568954s" podCreationTimestamp="2025-09-06 01:24:11 +0000 UTC" firstStartedPulling="2025-09-06 01:24:42.731416175 +0000 UTC m=+32.720695050" lastFinishedPulling="2025-09-06 01:24:45.691158384 +0000 UTC m=+35.680437259" observedRunningTime="2025-09-06 01:24:46.337550754 +0000 UTC m=+36.326829669" watchObservedRunningTime="2025-09-06 01:24:46.337568954 +0000 UTC m=+36.326847869" Sep 6 01:24:46.506426 systemd-networkd[1566]: cali9e80ee37dd0: Gained IPv6LL Sep 6 01:24:47.171237 kubelet[1873]: E0906 01:24:47.171186 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:48.171588 kubelet[1873]: E0906 01:24:48.171484 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:48.372906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1469427688.mount: Deactivated successfully. Sep 6 01:24:49.172144 kubelet[1873]: E0906 01:24:49.172089 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:49.777950 env[1420]: time="2025-09-06T01:24:49.777900549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:49.792137 env[1420]: time="2025-09-06T01:24:49.792088009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:49.803632 env[1420]: time="2025-09-06T01:24:49.803594513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:49.825426 env[1420]: time="2025-09-06T01:24:49.824841403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:49.825763 env[1420]: time="2025-09-06T01:24:49.825730762Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 6 01:24:49.835219 env[1420]: time="2025-09-06T01:24:49.835174229Z" level=info msg="CreateContainer within sandbox \"948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 6 01:24:49.874612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4182077074.mount: Deactivated successfully. Sep 6 01:24:49.882497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3781230076.mount: Deactivated successfully. Sep 6 01:24:49.904523 env[1420]: time="2025-09-06T01:24:49.904472852Z" level=info msg="CreateContainer within sandbox \"948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"37b92d00232269740d78c21e6708d5e3016f75ddc5d44b9e465d78b6b58c2958\"" Sep 6 01:24:49.905363 env[1420]: time="2025-09-06T01:24:49.905274171Z" level=info msg="StartContainer for \"37b92d00232269740d78c21e6708d5e3016f75ddc5d44b9e465d78b6b58c2958\"" Sep 6 01:24:49.923903 systemd[1]: Started cri-containerd-37b92d00232269740d78c21e6708d5e3016f75ddc5d44b9e465d78b6b58c2958.scope. Sep 6 01:24:49.942012 kernel: kauditd_printk_skb: 196 callbacks suppressed Sep 6 01:24:49.942157 kernel: audit: type=1400 audit(1757121889.934:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.978893 kernel: audit: type=1400 audit(1757121889.934:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.979013 kernel: audit: type=1400 audit(1757121889.934:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.014996 kernel: audit: type=1400 audit(1757121889.934:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.033583 kernel: audit: type=1400 audit(1757121889.934:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.052409 kernel: audit: type=1400 audit(1757121889.934:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.070648 kernel: audit: type=1400 audit(1757121889.934:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.089554 kernel: audit: type=1400 audit(1757121889.934:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.089636 kernel: audit: type=1400 audit(1757121889.934:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.111895 env[1420]: time="2025-09-06T01:24:50.111846085Z" level=info msg="StartContainer for \"37b92d00232269740d78c21e6708d5e3016f75ddc5d44b9e465d78b6b58c2958\" returns successfully" Sep 6 01:24:50.126200 kernel: audit: type=1400 audit(1757121889.940:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.940000 audit: BPF prog-id=118 op=LOAD Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2921 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623932643030323332323639373430643738633231653637303864 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2921 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623932643030323332323639373430643738633231653637303864 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit: BPF prog-id=119 op=LOAD Sep 6 01:24:49.958000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2921 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623932643030323332323639373430643738633231653637303864 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit: BPF prog-id=120 op=LOAD Sep 6 01:24:49.958000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2921 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623932643030323332323639373430643738633231653637303864 Sep 6 01:24:49.958000 audit: BPF prog-id=120 op=UNLOAD Sep 6 01:24:49.958000 audit: BPF prog-id=119 op=UNLOAD Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:49.958000 audit: BPF prog-id=121 op=LOAD Sep 6 01:24:49.958000 audit[3012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2921 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623932643030323332323639373430643738633231653637303864 Sep 6 01:24:50.173130 kubelet[1873]: E0906 01:24:50.173062 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:50.341791 kubelet[1873]: I0906 01:24:50.340149 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-tz5ck" podStartSLOduration=14.16693446 podStartE2EDuration="19.340131093s" podCreationTimestamp="2025-09-06 01:24:31 +0000 UTC" firstStartedPulling="2025-09-06 01:24:44.654129967 +0000 UTC m=+34.643408882" lastFinishedPulling="2025-09-06 01:24:49.8273266 +0000 UTC m=+39.816605515" observedRunningTime="2025-09-06 01:24:50.339902853 +0000 UTC m=+40.329181768" watchObservedRunningTime="2025-09-06 01:24:50.340131093 +0000 UTC m=+40.329410008" Sep 6 01:24:51.146137 kubelet[1873]: E0906 01:24:51.146096 1873 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:51.173424 kubelet[1873]: E0906 01:24:51.173387 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:52.174236 kubelet[1873]: E0906 01:24:52.174196 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:53.175703 kubelet[1873]: E0906 01:24:53.175657 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:54.176174 kubelet[1873]: E0906 01:24:54.176116 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:55.176249 kubelet[1873]: E0906 01:24:55.176206 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:56.177266 kubelet[1873]: E0906 01:24:56.177216 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:57.177462 kubelet[1873]: E0906 01:24:57.177423 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:58.177904 kubelet[1873]: E0906 01:24:58.177863 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:58.433000 audit[3070]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.439596 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 6 01:24:58.439742 kernel: audit: type=1325 audit(1757121898.433:729): table=filter:78 family=2 entries=20 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.433000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffcdf77490 a2=0 a3=1 items=0 ppid=2130 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.481222 kernel: audit: type=1300 audit(1757121898.433:729): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffcdf77490 a2=0 a3=1 items=0 ppid=2130 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.481378 kernel: audit: type=1327 audit(1757121898.433:729): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.490068 systemd[1]: Created slice kubepods-besteffort-pod718c21d9_a5f0_410d_9b0c_a2340bef26f9.slice. Sep 6 01:24:58.481000 audit[3070]: NETFILTER_CFG table=nat:79 family=2 entries=26 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.509735 kernel: audit: type=1325 audit(1757121898.481:730): table=nat:79 family=2 entries=26 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.481000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffcdf77490 a2=0 a3=1 items=0 ppid=2130 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.535972 kernel: audit: type=1300 audit(1757121898.481:730): arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffcdf77490 a2=0 a3=1 items=0 ppid=2130 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.550771 kernel: audit: type=1327 audit(1757121898.481:730): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.556000 audit[3074]: NETFILTER_CFG table=filter:80 family=2 entries=32 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.562334 kubelet[1873]: I0906 01:24:58.562292 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/718c21d9-a5f0-410d-9b0c-a2340bef26f9-data\") pod \"nfs-server-provisioner-0\" (UID: \"718c21d9-a5f0-410d-9b0c-a2340bef26f9\") " pod="default/nfs-server-provisioner-0" Sep 6 01:24:58.562550 kubelet[1873]: I0906 01:24:58.562533 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6ckhf\" (UniqueName: \"kubernetes.io/projected/718c21d9-a5f0-410d-9b0c-a2340bef26f9-kube-api-access-6ckhf\") pod \"nfs-server-provisioner-0\" (UID: \"718c21d9-a5f0-410d-9b0c-a2340bef26f9\") " pod="default/nfs-server-provisioner-0" Sep 6 01:24:58.556000 audit[3074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffeb757020 a2=0 a3=1 items=0 ppid=2130 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.599943 kernel: audit: type=1325 audit(1757121898.556:731): table=filter:80 family=2 entries=32 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.600106 kernel: audit: type=1300 audit(1757121898.556:731): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffeb757020 a2=0 a3=1 items=0 ppid=2130 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.613277 kernel: audit: type=1327 audit(1757121898.556:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.613367 kernel: audit: type=1325 audit(1757121898.572:732): table=nat:81 family=2 entries=26 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.572000 audit[3074]: NETFILTER_CFG table=nat:81 family=2 entries=26 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.572000 audit[3074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffeb757020 a2=0 a3=1 items=0 ppid=2130 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.794786 env[1420]: time="2025-09-06T01:24:58.794669776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:718c21d9-a5f0-410d-9b0c-a2340bef26f9,Namespace:default,Attempt:0,}" Sep 6 01:24:58.964273 systemd-networkd[1566]: cali60e51b789ff: Link UP Sep 6 01:24:58.980508 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:24:58.980650 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 6 01:24:58.981114 systemd-networkd[1566]: cali60e51b789ff: Gained carrier Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.888 [INFO][3076] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.40-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 718c21d9-a5f0-410d-9b0c-a2340bef26f9 1494 0 2025-09-06 01:24:58 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.40 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.888 [INFO][3076] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.911 [INFO][3090] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" HandleID="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Workload="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.911 [INFO][3090] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" HandleID="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Workload="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.40", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-06 01:24:58.911378205 +0000 UTC"}, Hostname:"10.200.20.40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.912 [INFO][3090] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.912 [INFO][3090] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.912 [INFO][3090] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.40' Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.921 [INFO][3090] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.926 [INFO][3090] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.931 [INFO][3090] ipam/ipam.go 511: Trying affinity for 192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.933 [INFO][3090] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.935 [INFO][3090] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.935 [INFO][3090] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.64/26 handle="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.936 [INFO][3090] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824 Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.946 [INFO][3090] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.64/26 handle="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.952 [INFO][3090] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.67/26] block=192.168.71.64/26 handle="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.952 [INFO][3090] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.67/26] handle="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" host="10.200.20.40" Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.952 [INFO][3090] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:58.997024 env[1420]: 2025-09-06 01:24:58.952 [INFO][3090] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.67/26] IPv6=[] ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" HandleID="k8s-pod-network.b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Workload="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:24:58.997743 env[1420]: 2025-09-06 01:24:58.955 [INFO][3076] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"718c21d9-a5f0-410d-9b0c-a2340bef26f9", ResourceVersion:"1494", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.71.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:58.997743 env[1420]: 2025-09-06 01:24:58.955 [INFO][3076] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.67/32] ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:24:58.997743 env[1420]: 2025-09-06 01:24:58.955 [INFO][3076] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:24:58.997743 env[1420]: 2025-09-06 01:24:58.981 [INFO][3076] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:24:58.997892 env[1420]: 2025-09-06 01:24:58.982 [INFO][3076] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"718c21d9-a5f0-410d-9b0c-a2340bef26f9", ResourceVersion:"1494", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.71.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"a2:c8:6f:31:59:b6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:58.997892 env[1420]: 2025-09-06 01:24:58.994 [INFO][3076] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.40-k8s-nfs--server--provisioner--0-eth0" Sep 6 01:24:59.008000 audit[3106]: NETFILTER_CFG table=filter:82 family=2 entries=40 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:59.008000 audit[3106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffeeb7b810 a2=0 a3=ffff988defa8 items=0 ppid=2524 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.008000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:59.018425 env[1420]: time="2025-09-06T01:24:59.018261925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:59.018425 env[1420]: time="2025-09-06T01:24:59.018306445Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:59.018813 env[1420]: time="2025-09-06T01:24:59.018640325Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:59.019030 env[1420]: time="2025-09-06T01:24:59.018935044Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824 pid=3115 runtime=io.containerd.runc.v2 Sep 6 01:24:59.041521 systemd[1]: Started cri-containerd-b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824.scope. Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.053000 audit: BPF prog-id=122 op=LOAD Sep 6 01:24:59.056000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.056000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356535386131356532373266353361333866373363626434613539 Sep 6 01:24:59.056000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.056000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356535386131356532373266353361333866373363626434613539 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit: BPF prog-id=123 op=LOAD Sep 6 01:24:59.057000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356535386131356532373266353361333866373363626434613539 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit: BPF prog-id=124 op=LOAD Sep 6 01:24:59.057000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356535386131356532373266353361333866373363626434613539 Sep 6 01:24:59.057000 audit: BPF prog-id=124 op=UNLOAD Sep 6 01:24:59.057000 audit: BPF prog-id=123 op=UNLOAD Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:59.057000 audit: BPF prog-id=125 op=LOAD Sep 6 01:24:59.057000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356535386131356532373266353361333866373363626434613539 Sep 6 01:24:59.079357 env[1420]: time="2025-09-06T01:24:59.079313458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:718c21d9-a5f0-410d-9b0c-a2340bef26f9,Namespace:default,Attempt:0,} returns sandbox id \"b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824\"" Sep 6 01:24:59.081354 env[1420]: time="2025-09-06T01:24:59.081313856Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 6 01:24:59.178276 kubelet[1873]: E0906 01:24:59.178225 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:24:59.675082 systemd[1]: run-containerd-runc-k8s.io-b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824-runc.FXF5kO.mount: Deactivated successfully. Sep 6 01:25:00.074146 systemd-networkd[1566]: cali60e51b789ff: Gained IPv6LL Sep 6 01:25:00.178703 kubelet[1873]: E0906 01:25:00.178646 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:01.179141 kubelet[1873]: E0906 01:25:01.179086 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:02.180442 kubelet[1873]: E0906 01:25:02.180384 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:02.953007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3417518777.mount: Deactivated successfully. Sep 6 01:25:03.181575 kubelet[1873]: E0906 01:25:03.181525 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:04.181824 kubelet[1873]: E0906 01:25:04.181769 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:04.975176 env[1420]: time="2025-09-06T01:25:04.975129381Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:04.987355 env[1420]: time="2025-09-06T01:25:04.987309329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:04.998090 env[1420]: time="2025-09-06T01:25:04.998042398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:05.007475 env[1420]: time="2025-09-06T01:25:05.007431029Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:05.009679 env[1420]: time="2025-09-06T01:25:05.009619787Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 6 01:25:05.020677 env[1420]: time="2025-09-06T01:25:05.020632017Z" level=info msg="CreateContainer within sandbox \"b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 6 01:25:05.056532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1823869598.mount: Deactivated successfully. Sep 6 01:25:05.063432 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2608839895.mount: Deactivated successfully. Sep 6 01:25:05.096658 env[1420]: time="2025-09-06T01:25:05.096605744Z" level=info msg="CreateContainer within sandbox \"b05e58a15e272f53a38f73cbd4a594b99d19137f5c2b8d33c5529c8a43ebf824\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"ba344460987c0caebb721a7268423f471196968b84191b10d0b7c04d7c2e8189\"" Sep 6 01:25:05.097660 env[1420]: time="2025-09-06T01:25:05.097613423Z" level=info msg="StartContainer for \"ba344460987c0caebb721a7268423f471196968b84191b10d0b7c04d7c2e8189\"" Sep 6 01:25:05.116141 systemd[1]: Started cri-containerd-ba344460987c0caebb721a7268423f471196968b84191b10d0b7c04d7c2e8189.scope. Sep 6 01:25:05.135888 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 6 01:25:05.136074 kernel: audit: type=1400 audit(1757121905.129:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.172271 kernel: audit: type=1400 audit(1757121905.129:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.189926 kernel: audit: type=1400 audit(1757121905.129:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.190070 kubelet[1873]: E0906 01:25:05.182498 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.209246 kernel: audit: type=1400 audit(1757121905.129:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.246530 kernel: audit: type=1400 audit(1757121905.129:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.246664 kernel: audit: type=1400 audit(1757121905.129:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.265462 kernel: audit: type=1400 audit(1757121905.129:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.284712 kernel: audit: type=1400 audit(1757121905.129:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.303071 kernel: audit: type=1400 audit(1757121905.129:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.320974 kernel: audit: type=1400 audit(1757121905.134:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.134000 audit: BPF prog-id=126 op=LOAD Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3115 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:05.321482 env[1420]: time="2025-09-06T01:25:05.321363768Z" level=info msg="StartContainer for \"ba344460987c0caebb721a7268423f471196968b84191b10d0b7c04d7c2e8189\" returns successfully" Sep 6 01:25:05.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333434343630393837633063616562623732316137323638343233 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3115 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:05.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333434343630393837633063616562623732316137323638343233 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.152000 audit: BPF prog-id=127 op=LOAD Sep 6 01:25:05.152000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3115 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:05.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333434343630393837633063616562623732316137323638343233 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit: BPF prog-id=128 op=LOAD Sep 6 01:25:05.153000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3115 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:05.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333434343630393837633063616562623732316137323638343233 Sep 6 01:25:05.153000 audit: BPF prog-id=128 op=UNLOAD Sep 6 01:25:05.153000 audit: BPF prog-id=127 op=UNLOAD Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:05.153000 audit: BPF prog-id=129 op=LOAD Sep 6 01:25:05.153000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3115 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:05.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333434343630393837633063616562623732316137323638343233 Sep 6 01:25:05.322000 audit[3185]: AVC avc: denied { search } for pid=3185 comm="rpcbind" name="crypto" dev="proc" ino=21593 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:25:05.322000 audit[3185]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbd10f000 a2=0 a3=0 items=0 ppid=3169 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 key=(null) Sep 6 01:25:05.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 6 01:25:05.369000 audit[3191]: AVC avc: denied { search } for pid=3191 comm="dbus-daemon" name="crypto" dev="proc" ino=21593 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:25:05.369000 audit[3191]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa24bf000 a2=0 a3=0 items=0 ppid=3169 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 key=(null) Sep 6 01:25:05.369000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 01:25:05.371960 kubelet[1873]: I0906 01:25:05.371873 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.4403523919999999 podStartE2EDuration="7.37185412s" podCreationTimestamp="2025-09-06 01:24:58 +0000 UTC" firstStartedPulling="2025-09-06 01:24:59.080931216 +0000 UTC m=+49.070210131" lastFinishedPulling="2025-09-06 01:25:05.012432944 +0000 UTC m=+55.001711859" observedRunningTime="2025-09-06 01:25:05.37179244 +0000 UTC m=+55.361071355" watchObservedRunningTime="2025-09-06 01:25:05.37185412 +0000 UTC m=+55.361133035" Sep 6 01:25:05.373000 audit[3192]: AVC avc: denied { watch } for pid=3192 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537433 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c330,c916 tclass=dir permissive=0 Sep 6 01:25:05.373000 audit[3192]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab005fecb0 a2=2c8 a3=aaab005faa60 items=0 ppid=3169 pid=3192 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 key=(null) Sep 6 01:25:05.373000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 6 01:25:05.379000 audit[3193]: AVC avc: denied { read } for pid=3193 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21619 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 6 01:25:05.379000 audit[3193]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb648a570 a2=80000 a3=0 items=0 ppid=3169 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 key=(null) Sep 6 01:25:05.379000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 01:25:05.380000 audit[3193]: AVC avc: denied { search } for pid=3193 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21593 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:25:05.380000 audit[3193]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb581f000 a2=0 a3=0 items=0 ppid=3169 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c916 key=(null) Sep 6 01:25:05.380000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 6 01:25:05.386000 audit[3195]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:05.386000 audit[3195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd7769100 a2=0 a3=1 items=0 ppid=2130 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:05.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:05.394000 audit[3195]: NETFILTER_CFG table=nat:84 family=2 entries=110 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:05.394000 audit[3195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffd7769100 a2=0 a3=1 items=0 ppid=2130 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:05.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:06.183711 kubelet[1873]: E0906 01:25:06.183667 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:07.184734 kubelet[1873]: E0906 01:25:07.184660 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:08.185744 kubelet[1873]: E0906 01:25:08.185699 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:09.186118 kubelet[1873]: E0906 01:25:09.186082 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:10.187466 kubelet[1873]: E0906 01:25:10.187421 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:11.146638 kubelet[1873]: E0906 01:25:11.146596 1873 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:11.170332 env[1420]: time="2025-09-06T01:25:11.170270804Z" level=info msg="StopPodSandbox for \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\"" Sep 6 01:25:11.188541 kubelet[1873]: E0906 01:25:11.188502 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.208 [WARNING][3210] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-csi--node--driver--grx5f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"965babbd-7255-47c8-b6e2-f2f770fa68c1", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f", Pod:"csi-node-driver-grx5f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali452f7017ade", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.208 [INFO][3210] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.208 [INFO][3210] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" iface="eth0" netns="" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.208 [INFO][3210] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.208 [INFO][3210] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.230 [INFO][3217] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.230 [INFO][3217] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.230 [INFO][3217] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.247 [WARNING][3217] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.247 [INFO][3217] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.249 [INFO][3217] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:11.253647 env[1420]: 2025-09-06 01:25:11.251 [INFO][3210] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.254277 env[1420]: time="2025-09-06T01:25:11.254227853Z" level=info msg="TearDown network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\" successfully" Sep 6 01:25:11.254360 env[1420]: time="2025-09-06T01:25:11.254337893Z" level=info msg="StopPodSandbox for \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\" returns successfully" Sep 6 01:25:11.255065 env[1420]: time="2025-09-06T01:25:11.255034733Z" level=info msg="RemovePodSandbox for \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\"" Sep 6 01:25:11.255263 env[1420]: time="2025-09-06T01:25:11.255217933Z" level=info msg="Forcibly stopping sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\"" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.292 [WARNING][3233] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-csi--node--driver--grx5f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"965babbd-7255-47c8-b6e2-f2f770fa68c1", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"26e035a9628d9f17edd575e996c33f80fa2d840eba141859d11dd61a6d77ef1f", Pod:"csi-node-driver-grx5f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali452f7017ade", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.292 [INFO][3233] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.292 [INFO][3233] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" iface="eth0" netns="" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.292 [INFO][3233] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.293 [INFO][3233] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.323 [INFO][3241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.324 [INFO][3241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.324 [INFO][3241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.333 [WARNING][3241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.333 [INFO][3241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" HandleID="k8s-pod-network.a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Workload="10.200.20.40-k8s-csi--node--driver--grx5f-eth0" Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.334 [INFO][3241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:11.338090 env[1420]: 2025-09-06 01:25:11.336 [INFO][3233] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03" Sep 6 01:25:11.338588 env[1420]: time="2025-09-06T01:25:11.338125263Z" level=info msg="TearDown network for sandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\" successfully" Sep 6 01:25:11.353758 env[1420]: time="2025-09-06T01:25:11.353702130Z" level=info msg="RemovePodSandbox \"a70e42faf7c045589fd6b0f153b0080a1b40576330fe3352bed269a563d25d03\" returns successfully" Sep 6 01:25:11.354485 env[1420]: time="2025-09-06T01:25:11.354453449Z" level=info msg="StopPodSandbox for \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\"" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.394 [WARNING][3256] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"fca746cd-57b7-43f6-be40-ce7b79dd9457", ResourceVersion:"1455", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d", Pod:"nginx-deployment-7fcdb87857-tz5ck", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9e80ee37dd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.395 [INFO][3256] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.395 [INFO][3256] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" iface="eth0" netns="" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.395 [INFO][3256] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.395 [INFO][3256] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.414 [INFO][3263] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.414 [INFO][3263] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.414 [INFO][3263] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.424 [WARNING][3263] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.424 [INFO][3263] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.425 [INFO][3263] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:11.429123 env[1420]: 2025-09-06 01:25:11.427 [INFO][3256] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.429720 env[1420]: time="2025-09-06T01:25:11.429667706Z" level=info msg="TearDown network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\" successfully" Sep 6 01:25:11.429799 env[1420]: time="2025-09-06T01:25:11.429782266Z" level=info msg="StopPodSandbox for \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\" returns successfully" Sep 6 01:25:11.430404 env[1420]: time="2025-09-06T01:25:11.430370425Z" level=info msg="RemovePodSandbox for \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\"" Sep 6 01:25:11.430755 env[1420]: time="2025-09-06T01:25:11.430691625Z" level=info msg="Forcibly stopping sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\"" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.477 [WARNING][3277] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"fca746cd-57b7-43f6-be40-ce7b79dd9457", ResourceVersion:"1455", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"948c2943afac953dadd327dd5a570aff6e23c34ffad3537469ad28e8421c8a8d", Pod:"nginx-deployment-7fcdb87857-tz5ck", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9e80ee37dd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.477 [INFO][3277] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.477 [INFO][3277] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" iface="eth0" netns="" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.477 [INFO][3277] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.477 [INFO][3277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.498 [INFO][3284] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.498 [INFO][3284] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.499 [INFO][3284] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.510 [WARNING][3284] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.510 [INFO][3284] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" HandleID="k8s-pod-network.7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Workload="10.200.20.40-k8s-nginx--deployment--7fcdb87857--tz5ck-eth0" Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.511 [INFO][3284] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:11.518827 env[1420]: 2025-09-06 01:25:11.515 [INFO][3277] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b" Sep 6 01:25:11.519607 env[1420]: time="2025-09-06T01:25:11.518880550Z" level=info msg="TearDown network for sandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\" successfully" Sep 6 01:25:11.528453 env[1420]: time="2025-09-06T01:25:11.528372463Z" level=info msg="RemovePodSandbox \"7f69afe98493d639d290fb0605537c2bbfa4b4761d4a901a9036f343ae37323b\" returns successfully" Sep 6 01:25:11.907266 systemd[1]: run-containerd-runc-k8s.io-25aa79bd40a5320ffd8bc164ca51399cf134e890737f52a3c41c6663393c1a06-runc.X39qL8.mount: Deactivated successfully. Sep 6 01:25:12.189641 kubelet[1873]: E0906 01:25:12.189477 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:13.189642 kubelet[1873]: E0906 01:25:13.189608 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:14.190312 kubelet[1873]: E0906 01:25:14.190270 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:15.191359 kubelet[1873]: E0906 01:25:15.191321 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:16.192364 kubelet[1873]: E0906 01:25:16.192318 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:17.193404 kubelet[1873]: E0906 01:25:17.193364 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:18.194124 kubelet[1873]: E0906 01:25:18.194080 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:19.194378 kubelet[1873]: E0906 01:25:19.194335 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:20.195462 kubelet[1873]: E0906 01:25:20.195423 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:21.196856 kubelet[1873]: E0906 01:25:21.196814 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:22.197235 kubelet[1873]: E0906 01:25:22.197196 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:23.198089 kubelet[1873]: E0906 01:25:23.198043 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:24.198710 kubelet[1873]: E0906 01:25:24.198676 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:25.200217 kubelet[1873]: E0906 01:25:25.200179 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:25.575179 systemd[1]: Created slice kubepods-besteffort-pod84489d15_3308_401e_abe7_dff671dfc17c.slice. Sep 6 01:25:25.596738 kubelet[1873]: I0906 01:25:25.596694 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-46b5ddc0-4aa2-4f85-8662-d0a0f568b2b3\" (UniqueName: \"kubernetes.io/nfs/84489d15-3308-401e-abe7-dff671dfc17c-pvc-46b5ddc0-4aa2-4f85-8662-d0a0f568b2b3\") pod \"test-pod-1\" (UID: \"84489d15-3308-401e-abe7-dff671dfc17c\") " pod="default/test-pod-1" Sep 6 01:25:25.597171 kubelet[1873]: I0906 01:25:25.597147 1873 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-svrg8\" (UniqueName: \"kubernetes.io/projected/84489d15-3308-401e-abe7-dff671dfc17c-kube-api-access-svrg8\") pod \"test-pod-1\" (UID: \"84489d15-3308-401e-abe7-dff671dfc17c\") " pod="default/test-pod-1" Sep 6 01:25:25.782000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.809999 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 01:25:25.810154 kernel: audit: type=1400 audit(1757121925.782:777): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.810195 kernel: Failed to create system directory netfs Sep 6 01:25:25.782000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.839839 kernel: Failed to create system directory netfs Sep 6 01:25:25.839998 kernel: audit: type=1400 audit(1757121925.782:777): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.840020 kernel: Failed to create system directory netfs Sep 6 01:25:25.782000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.863868 kernel: audit: type=1400 audit(1757121925.782:777): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.864000 kernel: Failed to create system directory netfs Sep 6 01:25:25.782000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.869073 kernel: audit: type=1400 audit(1757121925.782:777): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.782000 audit[3337]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab2038c5e0 a1=12c14 a2=aaaae9fae028 a3=aaab2037d010 items=0 ppid=299 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:25.916963 kernel: audit: type=1300 audit(1757121925.782:777): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab2038c5e0 a1=12c14 a2=aaaae9fae028 a3=aaab2037d010 items=0 ppid=299 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:25.782000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:25:25.927266 kernel: audit: type=1327 audit(1757121925.782:777): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:25:25.927365 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.951649 kernel: audit: type=1400 audit(1757121925.889:778): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.951784 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.976301 kernel: audit: type=1400 audit(1757121925.889:778): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.976432 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.000784 kernel: audit: type=1400 audit(1757121925.889:778): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.000901 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.024936 kernel: audit: type=1400 audit(1757121925.889:778): avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.025079 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.034196 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.039765 kernel: Failed to create system directory fscache Sep 6 01:25:26.039841 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.050995 kernel: Failed to create system directory fscache Sep 6 01:25:26.051048 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.062444 kernel: Failed to create system directory fscache Sep 6 01:25:26.062533 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.071905 kernel: Failed to create system directory fscache Sep 6 01:25:26.071991 kernel: Failed to create system directory fscache Sep 6 01:25:25.889000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.079591 kernel: FS-Cache: Loaded Sep 6 01:25:25.889000 audit[3337]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab2059f210 a1=4c344 a2=aaaae9fae028 a3=aaab2037d010 items=0 ppid=299 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:25.889000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:25:26.201077 kubelet[1873]: E0906 01:25:26.201031 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.232449 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.232589 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.232612 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.241057 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.241153 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.249967 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.250054 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.258688 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.258757 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.266938 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.267079 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.275320 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.279799 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.279868 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.288149 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.288231 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.296244 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.296319 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.304245 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.304337 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.312537 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.312618 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.320457 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.320506 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.328211 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.332517 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.332560 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.340168 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.340253 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.348245 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.348296 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.355823 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.355914 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.363789 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.363867 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.371192 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.371247 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.378695 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.378776 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.386589 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.386729 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.394323 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.394477 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.401830 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.401889 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.409435 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.409494 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.416898 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.416987 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.424414 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.424500 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.431889 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.431989 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.440082 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.440163 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.447791 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.447873 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.455515 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.460740 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.460801 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.468836 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.468917 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.476480 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.476543 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.484135 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.484229 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.491942 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.492037 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.499679 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.499732 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.507145 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.507243 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.514587 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.514672 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.518492 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.522305 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.525887 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.529741 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.537241 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.537281 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.545162 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.545216 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.552793 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.552866 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.560247 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.560325 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.568057 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.568112 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.571827 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.575641 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.579835 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.583611 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.587336 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.591088 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.599844 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.599890 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.607681 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.607778 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.615460 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.615532 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.623011 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.623133 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.627048 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.634697 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.634773 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.642560 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.642627 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.650580 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.650681 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.658445 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.658585 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.665987 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.666057 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.673895 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.673967 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.681666 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.681755 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.689908 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.689998 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.697438 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.701785 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.701873 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.709518 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.715031 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.715108 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.718658 kernel: Failed to create system directory sunrpc Sep 6 01:25:26.216000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.735423 kernel: RPC: Registered named UNIX socket transport module. Sep 6 01:25:26.735549 kernel: RPC: Registered udp transport module. Sep 6 01:25:26.735581 kernel: RPC: Registered tcp transport module. Sep 6 01:25:26.739301 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 6 01:25:26.216000 audit[3337]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab205eb560 a1=14a74c a2=aaaae9fae028 a3=aaab2037d010 items=6 ppid=299 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:26.216000 audit: CWD cwd="/" Sep 6 01:25:26.216000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:26.216000 audit: PATH item=1 name=(null) inode=21916 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:26.216000 audit: PATH item=2 name=(null) inode=21916 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:26.216000 audit: PATH item=3 name=(null) inode=21917 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:26.216000 audit: PATH item=4 name=(null) inode=21916 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:26.216000 audit: PATH item=5 name=(null) inode=21918 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:25:26.216000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.850310 kernel: Failed to create system directory nfs Sep 6 01:25:26.850402 kernel: Failed to create system directory nfs Sep 6 01:25:26.850435 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.853849 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.860912 kernel: Failed to create system directory nfs Sep 6 01:25:26.861001 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.864465 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.868003 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.875021 kernel: Failed to create system directory nfs Sep 6 01:25:26.875105 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.882317 kernel: Failed to create system directory nfs Sep 6 01:25:26.882400 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.889546 kernel: Failed to create system directory nfs Sep 6 01:25:26.889633 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.897638 kernel: Failed to create system directory nfs Sep 6 01:25:26.897717 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.904802 kernel: Failed to create system directory nfs Sep 6 01:25:26.904885 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.908440 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.912423 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.919456 kernel: Failed to create system directory nfs Sep 6 01:25:26.919544 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.926674 kernel: Failed to create system directory nfs Sep 6 01:25:26.926752 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.933883 kernel: Failed to create system directory nfs Sep 6 01:25:26.933988 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.940868 kernel: Failed to create system directory nfs Sep 6 01:25:26.940948 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.948646 kernel: Failed to create system directory nfs Sep 6 01:25:26.948700 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.955667 kernel: Failed to create system directory nfs Sep 6 01:25:26.955793 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.962955 kernel: Failed to create system directory nfs Sep 6 01:25:26.963044 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.971168 kernel: Failed to create system directory nfs Sep 6 01:25:26.971280 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.978315 kernel: Failed to create system directory nfs Sep 6 01:25:26.978413 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.990173 kernel: Failed to create system directory nfs Sep 6 01:25:26.990262 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.997739 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.001770 kernel: Failed to create system directory nfs Sep 6 01:25:27.001852 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.009137 kernel: Failed to create system directory nfs Sep 6 01:25:27.009186 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.016233 kernel: Failed to create system directory nfs Sep 6 01:25:27.016283 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.023842 kernel: Failed to create system directory nfs Sep 6 01:25:27.023922 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.031025 kernel: Failed to create system directory nfs Sep 6 01:25:27.031068 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.038126 kernel: Failed to create system directory nfs Sep 6 01:25:27.038224 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.045484 kernel: Failed to create system directory nfs Sep 6 01:25:27.045540 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.053088 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.057923 kernel: Failed to create system directory nfs Sep 6 01:25:27.058028 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.062039 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.066440 kernel: Failed to create system directory nfs Sep 6 01:25:26.837000 audit[3337]: AVC avc: denied { confidentiality } for pid=3337 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:26.837000 audit[3337]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab20794a40 a1=11672c a2=aaaae9fae028 a3=aaab2037d010 items=0 ppid=299 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:27.090176 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 6 01:25:26.837000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.152731 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.152891 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.157382 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.165303 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.165354 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.169376 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.173352 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.177094 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.181166 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.185244 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.189255 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.193221 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.197271 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.201244 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.201317 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.202391 kubelet[1873]: E0906 01:25:27.202337 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.209080 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.213135 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.217552 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.221315 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.225034 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.225120 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.236335 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.236435 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.236463 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.244858 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.249220 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.249276 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.256484 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.256527 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.264406 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.268666 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.268730 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.276313 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.276376 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.283882 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.291624 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.291701 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.295263 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.299032 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.302638 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.306397 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.310214 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.314568 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.314643 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.322748 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.326641 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.330175 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.330253 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.337647 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.341433 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.341508 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.348891 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.348960 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.356235 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.356279 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.363509 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.363586 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.370866 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.374834 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.374876 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.382825 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.382960 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.389423 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.389574 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.397073 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.397184 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.404463 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.404539 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.412004 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.415958 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.419796 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.423491 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.427565 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.431245 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.431315 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.439000 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.442819 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.442852 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.450686 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.450730 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.457898 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.457937 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.465205 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.469034 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.473132 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.477044 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.481410 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.481456 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.489032 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.492687 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.496561 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.496626 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.504040 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.504098 kernel: Failed to create system directory nfs4 Sep 6 01:25:27.136000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.615198 kernel: NFS: Registering the id_resolver key type Sep 6 01:25:27.615323 kernel: Key type id_resolver registered Sep 6 01:25:27.615344 kernel: Key type id_legacy registered Sep 6 01:25:27.136000 audit[3342]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb4cea010 a1=19c6dc a2=aaaab02be028 a3=aaaab1789010 items=0 ppid=299 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:27.136000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.660766 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.660832 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.660996 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.668693 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.673045 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.677054 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.681072 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.685138 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.689113 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.693221 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.693327 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.701002 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.701054 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.708581 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.708627 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.712453 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.716489 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.729564 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.729647 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.733800 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.733882 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.741458 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.741560 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.745433 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.749411 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.753283 kernel: Failed to create system directory rpcgss Sep 6 01:25:27.649000 audit[3343]: AVC avc: denied { confidentiality } for pid=3343 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:25:27.649000 audit[3343]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8efe2010 a1=5ee94 a2=aaaad622e028 a3=aaaaed7e0010 items=0 ppid=299 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:27.649000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 6 01:25:28.012017 nfsidmap[3352]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-95263eb338' Sep 6 01:25:28.018177 nfsidmap[3353]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-95263eb338' Sep 6 01:25:28.037000 audit[1524]: AVC avc: denied { watch_reads } for pid=1524 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:25:28.037000 audit[1524]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf0a73460 a2=10 a3=0 items=0 ppid=1 pid=1524 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.037000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 01:25:28.037000 audit[1524]: AVC avc: denied { watch_reads } for pid=1524 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:25:28.037000 audit[1524]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf0a73460 a2=10 a3=0 items=0 ppid=1 pid=1524 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.037000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 01:25:28.037000 audit[1524]: AVC avc: denied { watch_reads } for pid=1524 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:25:28.037000 audit[1524]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf0a73460 a2=10 a3=0 items=0 ppid=1 pid=1524 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.037000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 6 01:25:28.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:25:28.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:25:28.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 6 01:25:28.203180 kubelet[1873]: E0906 01:25:28.203139 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:28.279465 env[1420]: time="2025-09-06T01:25:28.279350201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:84489d15-3308-401e-abe7-dff671dfc17c,Namespace:default,Attempt:0,}" Sep 6 01:25:28.440585 systemd-networkd[1566]: cali5ec59c6bf6e: Link UP Sep 6 01:25:28.455027 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:25:28.455280 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 6 01:25:28.455678 systemd-networkd[1566]: cali5ec59c6bf6e: Gained carrier Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.358 [INFO][3355] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.40-k8s-test--pod--1-eth0 default 84489d15-3308-401e-abe7-dff671dfc17c 1581 0 2025-09-06 01:24:59 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.40 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.358 [INFO][3355] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-eth0" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.385 [INFO][3368] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" HandleID="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Workload="10.200.20.40-k8s-test--pod--1-eth0" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.385 [INFO][3368] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" HandleID="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Workload="10.200.20.40-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.40", "pod":"test-pod-1", "timestamp":"2025-09-06 01:25:28.385148217 +0000 UTC"}, Hostname:"10.200.20.40", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.385 [INFO][3368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.385 [INFO][3368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.385 [INFO][3368] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.40' Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.398 [INFO][3368] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.402 [INFO][3368] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.406 [INFO][3368] ipam/ipam.go 511: Trying affinity for 192.168.71.64/26 host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.407 [INFO][3368] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.409 [INFO][3368] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.64/26 host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.409 [INFO][3368] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.71.64/26 handle="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.411 [INFO][3368] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.416 [INFO][3368] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.71.64/26 handle="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.430 [INFO][3368] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.71.68/26] block=192.168.71.64/26 handle="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.430 [INFO][3368] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.68/26] handle="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" host="10.200.20.40" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.430 [INFO][3368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.430 [INFO][3368] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.71.68/26] IPv6=[] ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" HandleID="k8s-pod-network.7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Workload="10.200.20.40-k8s-test--pod--1-eth0" Sep 6 01:25:28.472671 env[1420]: 2025-09-06 01:25:28.432 [INFO][3355] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"84489d15-3308-401e-abe7-dff671dfc17c", ResourceVersion:"1581", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:28.474021 env[1420]: 2025-09-06 01:25:28.432 [INFO][3355] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.68/32] ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-eth0" Sep 6 01:25:28.474021 env[1420]: 2025-09-06 01:25:28.432 [INFO][3355] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-eth0" Sep 6 01:25:28.474021 env[1420]: 2025-09-06 01:25:28.456 [INFO][3355] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-eth0" Sep 6 01:25:28.474021 env[1420]: 2025-09-06 01:25:28.457 [INFO][3355] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.40-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"84489d15-3308-401e-abe7-dff671dfc17c", ResourceVersion:"1581", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.40", ContainerID:"7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"42:c7:e8:89:ed:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:28.474021 env[1420]: 2025-09-06 01:25:28.468 [INFO][3355] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.40-k8s-test--pod--1-eth0" Sep 6 01:25:28.482000 audit[3384]: NETFILTER_CFG table=filter:85 family=2 entries=40 op=nft_register_chain pid=3384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:25:28.482000 audit[3384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffdb29e020 a2=0 a3=ffff8cc5efa8 items=0 ppid=2524 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.482000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:25:28.496186 env[1420]: time="2025-09-06T01:25:28.496092149Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:25:28.496186 env[1420]: time="2025-09-06T01:25:28.496138069Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:25:28.496438 env[1420]: time="2025-09-06T01:25:28.496157509Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:25:28.496512 env[1420]: time="2025-09-06T01:25:28.496491989Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c pid=3392 runtime=io.containerd.runc.v2 Sep 6 01:25:28.514886 systemd[1]: Started cri-containerd-7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c.scope. Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit: BPF prog-id=130 op=LOAD Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3392 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646436643837313738616138663038323538623761356532623030 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3392 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646436643837313738616138663038323538623761356532623030 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.527000 audit: BPF prog-id=131 op=LOAD Sep 6 01:25:28.527000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3392 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646436643837313738616138663038323538623761356532623030 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit: BPF prog-id=132 op=LOAD Sep 6 01:25:28.528000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3392 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646436643837313738616138663038323538623761356532623030 Sep 6 01:25:28.528000 audit: BPF prog-id=132 op=UNLOAD Sep 6 01:25:28.528000 audit: BPF prog-id=131 op=UNLOAD Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:28.528000 audit: BPF prog-id=133 op=LOAD Sep 6 01:25:28.528000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3392 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646436643837313738616138663038323538623761356532623030 Sep 6 01:25:28.553506 env[1420]: time="2025-09-06T01:25:28.553444674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:84489d15-3308-401e-abe7-dff671dfc17c,Namespace:default,Attempt:0,} returns sandbox id \"7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c\"" Sep 6 01:25:28.556113 env[1420]: time="2025-09-06T01:25:28.556029832Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 6 01:25:28.918115 env[1420]: time="2025-09-06T01:25:28.918068491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.935842 env[1420]: time="2025-09-06T01:25:28.935793480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.944916 env[1420]: time="2025-09-06T01:25:28.944871874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.955770 env[1420]: time="2025-09-06T01:25:28.955728348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:28.956488 env[1420]: time="2025-09-06T01:25:28.956450467Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 6 01:25:28.967898 env[1420]: time="2025-09-06T01:25:28.967848820Z" level=info msg="CreateContainer within sandbox \"7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 6 01:25:29.012358 env[1420]: time="2025-09-06T01:25:29.012299193Z" level=info msg="CreateContainer within sandbox \"7edd6d87178aa8f08258b7a5e2b005d90c53e17aafaa54ce29fbb5b71db6f31c\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"3a34a92d7e2ea3669f0298a48c4f4caf7db8711bea5ea6d271bece67732dce54\"" Sep 6 01:25:29.012903 env[1420]: time="2025-09-06T01:25:29.012872073Z" level=info msg="StartContainer for \"3a34a92d7e2ea3669f0298a48c4f4caf7db8711bea5ea6d271bece67732dce54\"" Sep 6 01:25:29.033817 systemd[1]: Started cri-containerd-3a34a92d7e2ea3669f0298a48c4f4caf7db8711bea5ea6d271bece67732dce54.scope. Sep 6 01:25:29.038641 systemd[1]: run-containerd-runc-k8s.io-3a34a92d7e2ea3669f0298a48c4f4caf7db8711bea5ea6d271bece67732dce54-runc.PhDB5O.mount: Deactivated successfully. Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.053000 audit: BPF prog-id=134 op=LOAD Sep 6 01:25:29.054000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.054000 audit[3435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3392 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:29.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333461393264376532656133363639663032393861343863346634 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3392 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:29.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333461393264376532656133363639663032393861343863346634 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.055000 audit: BPF prog-id=135 op=LOAD Sep 6 01:25:29.055000 audit[3435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3392 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:29.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333461393264376532656133363639663032393861343863346634 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.056000 audit: BPF prog-id=136 op=LOAD Sep 6 01:25:29.056000 audit[3435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3392 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:29.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333461393264376532656133363639663032393861343863346634 Sep 6 01:25:29.057000 audit: BPF prog-id=136 op=UNLOAD Sep 6 01:25:29.057000 audit: BPF prog-id=135 op=UNLOAD Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:29.057000 audit: BPF prog-id=137 op=LOAD Sep 6 01:25:29.057000 audit[3435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3392 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:29.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361333461393264376532656133363639663032393861343863346634 Sep 6 01:25:29.078828 env[1420]: time="2025-09-06T01:25:29.078771993Z" level=info msg="StartContainer for \"3a34a92d7e2ea3669f0298a48c4f4caf7db8711bea5ea6d271bece67732dce54\" returns successfully" Sep 6 01:25:29.204038 kubelet[1873]: E0906 01:25:29.203890 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:29.413443 kubelet[1873]: I0906 01:25:29.413382 1873 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=30.010308879 podStartE2EDuration="30.413361712s" podCreationTimestamp="2025-09-06 01:24:59 +0000 UTC" firstStartedPulling="2025-09-06 01:25:28.555173953 +0000 UTC m=+78.544452828" lastFinishedPulling="2025-09-06 01:25:28.958226746 +0000 UTC m=+78.947505661" observedRunningTime="2025-09-06 01:25:29.413097712 +0000 UTC m=+79.402376627" watchObservedRunningTime="2025-09-06 01:25:29.413361712 +0000 UTC m=+79.402640627" Sep 6 01:25:29.770194 systemd-networkd[1566]: cali5ec59c6bf6e: Gained IPv6LL Sep 6 01:25:30.205009 kubelet[1873]: E0906 01:25:30.204965 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:31.146829 kubelet[1873]: E0906 01:25:31.146779 1873 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:31.206232 kubelet[1873]: E0906 01:25:31.206203 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:32.207651 kubelet[1873]: E0906 01:25:32.207612 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:33.208503 kubelet[1873]: E0906 01:25:33.208468 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:34.209578 kubelet[1873]: E0906 01:25:34.209540 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 6 01:25:35.211122 kubelet[1873]: E0906 01:25:35.211070 1873 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"