Sep 13 00:52:57.009932 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:52:57.009965 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:52:57.009980 kernel: BIOS-provided physical RAM map: Sep 13 00:52:57.009990 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 13 00:52:57.010000 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Sep 13 00:52:57.010010 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Sep 13 00:52:57.010024 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc4fff] reserved Sep 13 00:52:57.010034 kernel: BIOS-e820: [mem 0x000000003ffc5000-0x000000003ffd1fff] usable Sep 13 00:52:57.010045 kernel: BIOS-e820: [mem 0x000000003ffd2000-0x000000003fffafff] ACPI data Sep 13 00:52:57.010055 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Sep 13 00:52:57.010065 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Sep 13 00:52:57.010075 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Sep 13 00:52:57.010085 kernel: printk: bootconsole [earlyser0] enabled Sep 13 00:52:57.010096 kernel: NX (Execute Disable) protection: active Sep 13 00:52:57.010111 kernel: efi: EFI v2.70 by Microsoft Sep 13 00:52:57.010122 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f340a98 RNG=0x3ffd2018 Sep 13 00:52:57.010132 kernel: random: crng init done Sep 13 00:52:57.010143 kernel: SMBIOS 3.1.0 present. Sep 13 00:52:57.010153 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 13 00:52:57.010164 kernel: Hypervisor detected: Microsoft Hyper-V Sep 13 00:52:57.010176 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Sep 13 00:52:57.010187 kernel: Hyper-V Host Build:26100-10.0-1-0.1293 Sep 13 00:52:57.010277 kernel: Hyper-V: Nested features: 0x1e0101 Sep 13 00:52:57.010289 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Sep 13 00:52:57.010300 kernel: Hyper-V: Using hypercall for remote TLB flush Sep 13 00:52:57.010311 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Sep 13 00:52:57.010323 kernel: tsc: Marking TSC unstable due to running on Hyper-V Sep 13 00:52:57.010335 kernel: tsc: Detected 2793.437 MHz processor Sep 13 00:52:57.010346 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:52:57.010357 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:52:57.010368 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Sep 13 00:52:57.010379 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:52:57.010394 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Sep 13 00:52:57.010406 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Sep 13 00:52:57.010417 kernel: Using GB pages for direct mapping Sep 13 00:52:57.010427 kernel: Secure boot disabled Sep 13 00:52:57.010439 kernel: ACPI: Early table checksum verification disabled Sep 13 00:52:57.010450 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Sep 13 00:52:57.010461 kernel: ACPI: XSDT 0x000000003FFF90E8 00005C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010472 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010490 kernel: ACPI: DSDT 0x000000003FFD6000 01E11C (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 13 00:52:57.010501 kernel: ACPI: FACS 0x000000003FFFE000 000040 Sep 13 00:52:57.010513 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010524 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010536 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010548 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010562 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010574 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:52:57.010585 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Sep 13 00:52:57.010598 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff411b] Sep 13 00:52:57.010609 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Sep 13 00:52:57.010620 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Sep 13 00:52:57.010633 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Sep 13 00:52:57.010645 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Sep 13 00:52:57.010656 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Sep 13 00:52:57.010670 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Sep 13 00:52:57.010682 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Sep 13 00:52:57.010694 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:52:57.010706 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:52:57.010717 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Sep 13 00:52:57.010729 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Sep 13 00:52:57.010741 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Sep 13 00:52:57.010753 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Sep 13 00:52:57.010765 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Sep 13 00:52:57.010779 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Sep 13 00:52:57.010791 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Sep 13 00:52:57.010802 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Sep 13 00:52:57.010814 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Sep 13 00:52:57.010826 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Sep 13 00:52:57.010837 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Sep 13 00:52:57.010849 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Sep 13 00:52:57.010861 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Sep 13 00:52:57.010875 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Sep 13 00:52:57.010887 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Sep 13 00:52:57.010899 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Sep 13 00:52:57.010910 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Sep 13 00:52:57.010923 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Sep 13 00:52:57.010934 kernel: Zone ranges: Sep 13 00:52:57.010946 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:52:57.010958 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 13 00:52:57.010969 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:52:57.010983 kernel: Movable zone start for each node Sep 13 00:52:57.010995 kernel: Early memory node ranges Sep 13 00:52:57.011007 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 13 00:52:57.011018 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Sep 13 00:52:57.011029 kernel: node 0: [mem 0x000000003ffc5000-0x000000003ffd1fff] Sep 13 00:52:57.011041 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Sep 13 00:52:57.011053 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:52:57.011065 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Sep 13 00:52:57.011077 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:52:57.011091 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 13 00:52:57.011102 kernel: On node 0, zone DMA32: 132 pages in unavailable ranges Sep 13 00:52:57.011114 kernel: On node 0, zone DMA32: 45 pages in unavailable ranges Sep 13 00:52:57.011126 kernel: ACPI: PM-Timer IO Port: 0x408 Sep 13 00:52:57.011137 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Sep 13 00:52:57.011149 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:52:57.011161 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:52:57.011173 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:52:57.011185 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Sep 13 00:52:57.011198 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:52:57.011218 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Sep 13 00:52:57.011230 kernel: Booting paravirtualized kernel on Hyper-V Sep 13 00:52:57.011243 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:52:57.011255 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:52:57.011266 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:52:57.011278 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:52:57.011289 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:52:57.011301 kernel: Hyper-V: PV spinlocks enabled Sep 13 00:52:57.011316 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 13 00:52:57.011328 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062375 Sep 13 00:52:57.011340 kernel: Policy zone: Normal Sep 13 00:52:57.011354 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:52:57.011366 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:52:57.011378 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 13 00:52:57.011390 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:52:57.011402 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:52:57.011417 kernel: Memory: 8076668K/8387512K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 310584K reserved, 0K cma-reserved) Sep 13 00:52:57.011429 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:52:57.011450 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:52:57.011464 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:52:57.011476 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:52:57.011489 kernel: rcu: RCU event tracing is enabled. Sep 13 00:52:57.011502 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:52:57.011515 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:52:57.011528 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:52:57.011540 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:52:57.011553 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:52:57.011566 kernel: Using NULL legacy PIC Sep 13 00:52:57.011580 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Sep 13 00:52:57.011593 kernel: Console: colour dummy device 80x25 Sep 13 00:52:57.011605 kernel: printk: console [tty1] enabled Sep 13 00:52:57.011618 kernel: printk: console [ttyS0] enabled Sep 13 00:52:57.011631 kernel: printk: bootconsole [earlyser0] disabled Sep 13 00:52:57.011645 kernel: ACPI: Core revision 20210730 Sep 13 00:52:57.011658 kernel: Failed to register legacy timer interrupt Sep 13 00:52:57.011670 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:52:57.011682 kernel: Hyper-V: Using IPI hypercalls Sep 13 00:52:57.011695 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5586.87 BogoMIPS (lpj=2793437) Sep 13 00:52:57.011707 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 13 00:52:57.011720 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 13 00:52:57.011733 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 13 00:52:57.011745 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:52:57.011759 kernel: Spectre V2 : Mitigation: Retpolines Sep 13 00:52:57.011772 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:52:57.011784 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 13 00:52:57.011797 kernel: RETBleed: Vulnerable Sep 13 00:52:57.011809 kernel: Speculative Store Bypass: Vulnerable Sep 13 00:52:57.011822 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:52:57.011834 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:52:57.011846 kernel: active return thunk: its_return_thunk Sep 13 00:52:57.011858 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:52:57.011871 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:52:57.011883 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:52:57.011897 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:52:57.011909 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 13 00:52:57.011921 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 13 00:52:57.011934 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 13 00:52:57.011946 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:52:57.011958 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 13 00:52:57.011971 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 13 00:52:57.011983 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 13 00:52:57.011995 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Sep 13 00:52:57.012008 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:52:57.012020 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:52:57.012034 kernel: LSM: Security Framework initializing Sep 13 00:52:57.012046 kernel: SELinux: Initializing. Sep 13 00:52:57.012059 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:52:57.012071 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:52:57.012084 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8370C CPU @ 2.80GHz (family: 0x6, model: 0x6a, stepping: 0x6) Sep 13 00:52:57.012096 kernel: Performance Events: unsupported p6 CPU model 106 no PMU driver, software events only. Sep 13 00:52:57.012108 kernel: signal: max sigframe size: 3632 Sep 13 00:52:57.012120 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:52:57.012132 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:52:57.012144 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:52:57.012158 kernel: x86: Booting SMP configuration: Sep 13 00:52:57.012170 kernel: .... node #0, CPUs: #1 Sep 13 00:52:57.012183 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Sep 13 00:52:57.012196 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 13 00:52:57.012215 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:52:57.012225 kernel: smpboot: Max logical packages: 1 Sep 13 00:52:57.012236 kernel: smpboot: Total of 2 processors activated (11173.74 BogoMIPS) Sep 13 00:52:57.012247 kernel: devtmpfs: initialized Sep 13 00:52:57.012257 kernel: x86/mm: Memory block size: 128MB Sep 13 00:52:57.012268 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Sep 13 00:52:57.012279 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:52:57.012291 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:52:57.012308 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:52:57.012314 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:52:57.012326 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:52:57.012333 kernel: audit: type=2000 audit(1757724776.023:1): state=initialized audit_enabled=0 res=1 Sep 13 00:52:57.012342 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:52:57.012352 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:52:57.012358 kernel: cpuidle: using governor menu Sep 13 00:52:57.012365 kernel: ACPI: bus type PCI registered Sep 13 00:52:57.012381 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:52:57.012387 kernel: dca service started, version 1.12.1 Sep 13 00:52:57.012395 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:52:57.012404 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:52:57.012410 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:52:57.012417 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:52:57.012432 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:52:57.012439 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:52:57.012445 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:52:57.012451 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:52:57.012457 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:52:57.012463 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:52:57.012471 kernel: ACPI: Interpreter enabled Sep 13 00:52:57.012482 kernel: ACPI: PM: (supports S0 S5) Sep 13 00:52:57.012488 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:52:57.012494 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:52:57.012502 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Sep 13 00:52:57.012508 kernel: iommu: Default domain type: Translated Sep 13 00:52:57.012517 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:52:57.012525 kernel: vgaarb: loaded Sep 13 00:52:57.012531 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:52:57.012538 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:52:57.012544 kernel: PTP clock support registered Sep 13 00:52:57.012551 kernel: Registered efivars operations Sep 13 00:52:57.012561 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:52:57.012569 kernel: PCI: System does not support PCI Sep 13 00:52:57.012575 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Sep 13 00:52:57.012581 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:52:57.012587 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:52:57.012596 kernel: pnp: PnP ACPI init Sep 13 00:52:57.012604 kernel: pnp: PnP ACPI: found 3 devices Sep 13 00:52:57.012610 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:52:57.012617 kernel: NET: Registered PF_INET protocol family Sep 13 00:52:57.012623 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:52:57.012631 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 13 00:52:57.012638 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:52:57.012649 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:52:57.012657 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 13 00:52:57.012663 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 13 00:52:57.012669 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:52:57.012676 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:52:57.012686 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:52:57.012692 kernel: NET: Registered PF_XDP protocol family Sep 13 00:52:57.012699 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:52:57.012711 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 13 00:52:57.012718 kernel: software IO TLB: mapped [mem 0x000000003aa89000-0x000000003ea89000] (64MB) Sep 13 00:52:57.012724 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:52:57.012740 kernel: Initialise system trusted keyrings Sep 13 00:52:57.012748 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 13 00:52:57.012758 kernel: Key type asymmetric registered Sep 13 00:52:57.012766 kernel: Asymmetric key parser 'x509' registered Sep 13 00:52:57.012772 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:52:57.012794 kernel: io scheduler mq-deadline registered Sep 13 00:52:57.012803 kernel: io scheduler kyber registered Sep 13 00:52:57.012816 kernel: io scheduler bfq registered Sep 13 00:52:57.012822 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:52:57.012829 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:52:57.012840 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:52:57.012846 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 13 00:52:57.012853 kernel: i8042: PNP: No PS/2 controller found. Sep 13 00:52:57.013005 kernel: rtc_cmos 00:02: registered as rtc0 Sep 13 00:52:57.013104 kernel: rtc_cmos 00:02: setting system clock to 2025-09-13T00:52:56 UTC (1757724776) Sep 13 00:52:57.013195 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Sep 13 00:52:57.013216 kernel: intel_pstate: CPU model not supported Sep 13 00:52:57.013222 kernel: efifb: probing for efifb Sep 13 00:52:57.013232 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 00:52:57.013248 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 00:52:57.013254 kernel: efifb: scrolling: redraw Sep 13 00:52:57.013267 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 00:52:57.013274 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:52:57.013281 kernel: fb0: EFI VGA frame buffer device Sep 13 00:52:57.013290 kernel: pstore: Registered efi as persistent store backend Sep 13 00:52:57.013297 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:52:57.013304 kernel: Segment Routing with IPv6 Sep 13 00:52:57.013314 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:52:57.013320 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:52:57.013326 kernel: Key type dns_resolver registered Sep 13 00:52:57.013337 kernel: IPI shorthand broadcast: enabled Sep 13 00:52:57.013345 kernel: sched_clock: Marking stable (764056000, 20695000)->(966155500, -181404500) Sep 13 00:52:57.013354 kernel: registered taskstats version 1 Sep 13 00:52:57.013363 kernel: Loading compiled-in X.509 certificates Sep 13 00:52:57.013371 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:52:57.013380 kernel: Key type .fscrypt registered Sep 13 00:52:57.013386 kernel: Key type fscrypt-provisioning registered Sep 13 00:52:57.013392 kernel: pstore: Using crash dump compression: deflate Sep 13 00:52:57.013399 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:52:57.013411 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:52:57.013418 kernel: ima: No architecture policies found Sep 13 00:52:57.013426 kernel: clk: Disabling unused clocks Sep 13 00:52:57.013436 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:52:57.013442 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:52:57.013449 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:52:57.013460 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:52:57.013466 kernel: Run /init as init process Sep 13 00:52:57.013473 kernel: with arguments: Sep 13 00:52:57.013484 kernel: /init Sep 13 00:52:57.013490 kernel: with environment: Sep 13 00:52:57.013498 kernel: HOME=/ Sep 13 00:52:57.013507 kernel: TERM=linux Sep 13 00:52:57.013513 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:52:57.013524 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:52:57.013534 systemd[1]: Detected virtualization microsoft. Sep 13 00:52:57.013542 systemd[1]: Detected architecture x86-64. Sep 13 00:52:57.013554 systemd[1]: Running in initrd. Sep 13 00:52:57.013560 systemd[1]: No hostname configured, using default hostname. Sep 13 00:52:57.013568 systemd[1]: Hostname set to . Sep 13 00:52:57.013579 systemd[1]: Initializing machine ID from random generator. Sep 13 00:52:57.013585 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:52:57.013595 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:52:57.013604 systemd[1]: Reached target cryptsetup.target. Sep 13 00:52:57.013610 systemd[1]: Reached target paths.target. Sep 13 00:52:57.013623 systemd[1]: Reached target slices.target. Sep 13 00:52:57.013629 systemd[1]: Reached target swap.target. Sep 13 00:52:57.013639 systemd[1]: Reached target timers.target. Sep 13 00:52:57.013647 systemd[1]: Listening on iscsid.socket. Sep 13 00:52:57.013654 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:52:57.013666 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:52:57.013673 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:52:57.013682 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:52:57.013692 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:52:57.013699 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:52:57.013711 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:52:57.013718 systemd[1]: Reached target sockets.target. Sep 13 00:52:57.013727 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:52:57.013736 systemd[1]: Finished network-cleanup.service. Sep 13 00:52:57.013742 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:52:57.013752 systemd[1]: Starting systemd-journald.service... Sep 13 00:52:57.013761 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:52:57.013778 systemd[1]: Starting systemd-resolved.service... Sep 13 00:52:57.013786 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:52:57.013796 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:52:57.013809 systemd-journald[183]: Journal started Sep 13 00:52:57.013857 systemd-journald[183]: Runtime Journal (/run/log/journal/2a7548bfa6f44f838a13e9db82d95b1e) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:52:56.997637 systemd-modules-load[184]: Inserted module 'overlay' Sep 13 00:52:57.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.032492 kernel: audit: type=1130 audit(1757724777.016:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.032536 systemd[1]: Started systemd-journald.service. Sep 13 00:52:57.042918 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:52:57.047551 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:52:57.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.066396 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:52:57.076688 kernel: audit: type=1130 audit(1757724777.042:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.069422 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:52:57.083240 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:52:57.096694 systemd-resolved[185]: Positive Trust Anchors: Sep 13 00:52:57.096852 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:52:57.096885 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:52:57.102312 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:52:57.099679 systemd-resolved[185]: Defaulting to hostname 'linux'. Sep 13 00:52:57.100722 systemd[1]: Started systemd-resolved.service. Sep 13 00:52:57.103712 systemd[1]: Reached target nss-lookup.target. Sep 13 00:52:57.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.143605 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:52:57.162604 kernel: audit: type=1130 audit(1757724777.047:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.162631 kernel: audit: type=1130 audit(1757724777.049:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.157036 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:52:57.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.182220 kernel: audit: type=1130 audit(1757724777.087:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.182247 kernel: Bridge firewalling registered Sep 13 00:52:57.182420 dracut-cmdline[201]: dracut-dracut-053 Sep 13 00:52:57.199598 kernel: audit: type=1130 audit(1757724777.101:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.199667 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:52:57.224573 kernel: audit: type=1130 audit(1757724777.156:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.185614 systemd-modules-load[184]: Inserted module 'br_netfilter' Sep 13 00:52:57.256221 kernel: SCSI subsystem initialized Sep 13 00:52:57.283047 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:52:57.283102 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:52:57.288803 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:52:57.288827 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:52:57.296911 systemd-modules-load[184]: Inserted module 'dm_multipath' Sep 13 00:52:57.297825 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:52:57.318247 kernel: audit: type=1130 audit(1757724777.304:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.319342 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:52:57.331128 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:52:57.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.349217 kernel: audit: type=1130 audit(1757724777.335:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.353228 kernel: iscsi: registered transport (tcp) Sep 13 00:52:57.381571 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:52:57.381618 kernel: QLogic iSCSI HBA Driver Sep 13 00:52:57.409285 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:52:57.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.414322 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:52:57.465221 kernel: raid6: avx512x4 gen() 43867 MB/s Sep 13 00:52:57.485215 kernel: raid6: avx512x4 xor() 10754 MB/s Sep 13 00:52:57.505213 kernel: raid6: avx512x2 gen() 45106 MB/s Sep 13 00:52:57.525217 kernel: raid6: avx512x2 xor() 26887 MB/s Sep 13 00:52:57.545212 kernel: raid6: avx512x1 gen() 43971 MB/s Sep 13 00:52:57.565212 kernel: raid6: avx512x1 xor() 24680 MB/s Sep 13 00:52:57.586225 kernel: raid6: avx2x4 gen() 34690 MB/s Sep 13 00:52:57.606215 kernel: raid6: avx2x4 xor() 10791 MB/s Sep 13 00:52:57.626213 kernel: raid6: avx2x2 gen() 33987 MB/s Sep 13 00:52:57.646216 kernel: raid6: avx2x2 xor() 21388 MB/s Sep 13 00:52:57.666214 kernel: raid6: avx2x1 gen() 27543 MB/s Sep 13 00:52:57.686213 kernel: raid6: avx2x1 xor() 17223 MB/s Sep 13 00:52:57.706215 kernel: raid6: sse2x4 gen() 10240 MB/s Sep 13 00:52:57.726217 kernel: raid6: sse2x4 xor() 5945 MB/s Sep 13 00:52:57.746213 kernel: raid6: sse2x2 gen() 10089 MB/s Sep 13 00:52:57.766215 kernel: raid6: sse2x2 xor() 6624 MB/s Sep 13 00:52:57.786213 kernel: raid6: sse2x1 gen() 9046 MB/s Sep 13 00:52:57.809290 kernel: raid6: sse2x1 xor() 5327 MB/s Sep 13 00:52:57.809315 kernel: raid6: using algorithm avx512x2 gen() 45106 MB/s Sep 13 00:52:57.809328 kernel: raid6: .... xor() 26887 MB/s, rmw enabled Sep 13 00:52:57.812706 kernel: raid6: using avx512x2 recovery algorithm Sep 13 00:52:57.833224 kernel: xor: automatically using best checksumming function avx Sep 13 00:52:57.934226 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:52:57.941874 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:52:57.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.945000 audit: BPF prog-id=7 op=LOAD Sep 13 00:52:57.945000 audit: BPF prog-id=8 op=LOAD Sep 13 00:52:57.946539 systemd[1]: Starting systemd-udevd.service... Sep 13 00:52:57.961248 systemd-udevd[384]: Using default interface naming scheme 'v252'. Sep 13 00:52:57.967485 systemd[1]: Started systemd-udevd.service. Sep 13 00:52:57.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:57.973045 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:52:57.987041 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Sep 13 00:52:58.015736 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:52:58.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:58.018647 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:52:58.053533 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:52:58.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:58.098216 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:52:58.134517 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:52:58.134564 kernel: AES CTR mode by8 optimization enabled Sep 13 00:52:58.139367 kernel: hv_vmbus: Vmbus version:5.2 Sep 13 00:52:58.155857 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 00:52:58.179220 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 13 00:52:58.185216 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 00:52:58.185251 kernel: scsi host1: storvsc_host_t Sep 13 00:52:58.189226 kernel: scsi host0: storvsc_host_t Sep 13 00:52:58.199263 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 00:52:58.199347 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 00:52:58.208286 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 5 Sep 13 00:52:58.217214 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:52:58.233993 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 00:52:58.234034 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 13 00:52:58.240735 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 00:52:58.249276 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 00:52:58.258022 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 00:52:58.258043 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 00:52:58.274151 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 00:52:58.301939 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 00:52:58.302059 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 00:52:58.302158 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 00:52:58.302302 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 00:52:58.302456 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:52:58.302473 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#216 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:52:58.302621 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 00:52:58.330226 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#265 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:52:58.348239 kernel: hv_netvsc 7c1e5279-7a95-7c1e-5279-7a957c1e5279 eth0: VF slot 1 added Sep 13 00:52:58.360715 kernel: hv_vmbus: registering driver hv_pci Sep 13 00:52:58.360756 kernel: hv_pci fa5876b5-a836-4f19-bfc6-e1fec3ea8371: PCI VMBus probing: Using version 0x10004 Sep 13 00:52:58.428780 kernel: hv_pci fa5876b5-a836-4f19-bfc6-e1fec3ea8371: PCI host bridge to bus a836:00 Sep 13 00:52:58.428937 kernel: pci_bus a836:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Sep 13 00:52:58.429096 kernel: pci_bus a836:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 00:52:58.429242 kernel: pci a836:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 00:52:58.429393 kernel: pci a836:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:52:58.429530 kernel: pci a836:00:02.0: enabling Extended Tags Sep 13 00:52:58.429652 kernel: pci a836:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at a836:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 00:52:58.429776 kernel: pci_bus a836:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 00:52:58.429897 kernel: pci a836:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:52:58.430020 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (447) Sep 13 00:52:58.457757 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:52:58.476459 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:52:58.500334 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:52:58.523518 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:52:58.529811 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:52:58.538499 systemd[1]: Starting disk-uuid.service... Sep 13 00:52:58.560216 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:52:58.570419 kernel: mlx5_core a836:00:02.0: enabling device (0000 -> 0002) Sep 13 00:52:58.823764 kernel: mlx5_core a836:00:02.0: firmware version: 16.30.5000 Sep 13 00:52:58.823951 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:52:58.823968 kernel: mlx5_core a836:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 00:52:58.824127 kernel: mlx5_core a836:00:02.0: Supported tc offload range - chains: 1, prios: 1 Sep 13 00:52:58.824295 kernel: mlx5_core a836:00:02.0: mlx5e_tc_post_act_init:40:(pid 188): firmware level support is missing Sep 13 00:52:58.824446 kernel: hv_netvsc 7c1e5279-7a95-7c1e-5279-7a957c1e5279 eth0: VF registering: eth1 Sep 13 00:52:58.824594 kernel: mlx5_core a836:00:02.0 eth1: joined to eth0 Sep 13 00:52:58.831221 kernel: mlx5_core a836:00:02.0 enP43062s1: renamed from eth1 Sep 13 00:52:59.571224 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:52:59.571393 disk-uuid[556]: The operation has completed successfully. Sep 13 00:52:59.638266 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:52:59.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:59.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:59.638368 systemd[1]: Finished disk-uuid.service. Sep 13 00:52:59.651826 systemd[1]: Starting verity-setup.service... Sep 13 00:52:59.676237 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Sep 13 00:52:59.766648 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:52:59.772584 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:52:59.776781 systemd[1]: Finished verity-setup.service. Sep 13 00:52:59.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:59.849229 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:52:59.849346 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:52:59.853335 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:52:59.857735 systemd[1]: Starting ignition-setup.service... Sep 13 00:52:59.862643 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:52:59.883146 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:52:59.883183 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:52:59.883197 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:52:59.934248 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:52:59.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:59.939000 audit: BPF prog-id=9 op=LOAD Sep 13 00:52:59.940477 systemd[1]: Starting systemd-networkd.service... Sep 13 00:52:59.948250 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:52:59.964098 systemd-networkd[812]: lo: Link UP Sep 13 00:52:59.964233 systemd-networkd[812]: lo: Gained carrier Sep 13 00:52:59.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:59.965161 systemd-networkd[812]: Enumeration completed Sep 13 00:52:59.965267 systemd[1]: Started systemd-networkd.service. Sep 13 00:52:59.967965 systemd-networkd[812]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:52:59.968419 systemd[1]: Reached target network.target. Sep 13 00:52:59.976935 systemd[1]: Starting iscsiuio.service... Sep 13 00:52:59.990877 systemd[1]: Started iscsiuio.service. Sep 13 00:52:59.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:59.994516 systemd[1]: Finished ignition-setup.service. Sep 13 00:52:59.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:59.999745 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:53:00.004914 systemd[1]: Starting iscsid.service... Sep 13 00:53:00.008965 iscsid[819]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:53:00.008965 iscsid[819]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 13 00:53:00.008965 iscsid[819]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:53:00.008965 iscsid[819]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:53:00.008965 iscsid[819]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:53:00.008965 iscsid[819]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:53:00.008965 iscsid[819]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:53:00.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.010369 systemd[1]: Started iscsid.service. Sep 13 00:53:00.015528 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:53:00.045399 kernel: mlx5_core a836:00:02.0 enP43062s1: Link up Sep 13 00:53:00.050313 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:53:00.055607 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:53:00.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.059755 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:53:00.063722 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:53:00.067708 systemd[1]: Reached target remote-fs.target. Sep 13 00:53:00.072005 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:53:00.083428 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:53:00.094694 kernel: hv_netvsc 7c1e5279-7a95-7c1e-5279-7a957c1e5279 eth0: Data path switched to VF: enP43062s1 Sep 13 00:53:00.094912 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:53:00.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.094619 systemd-networkd[812]: enP43062s1: Link UP Sep 13 00:53:00.094879 systemd-networkd[812]: eth0: Link UP Sep 13 00:53:00.095429 systemd-networkd[812]: eth0: Gained carrier Sep 13 00:53:00.103382 systemd-networkd[812]: enP43062s1: Gained carrier Sep 13 00:53:00.111259 systemd-networkd[812]: eth0: DHCPv4 address 10.200.4.19/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:53:00.652446 ignition[818]: Ignition 2.14.0 Sep 13 00:53:00.652459 ignition[818]: Stage: fetch-offline Sep 13 00:53:00.652523 ignition[818]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:00.652562 ignition[818]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:00.682775 ignition[818]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:00.686671 ignition[818]: parsed url from cmdline: "" Sep 13 00:53:00.686683 ignition[818]: no config URL provided Sep 13 00:53:00.686693 ignition[818]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:53:00.686705 ignition[818]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:53:00.686712 ignition[818]: failed to fetch config: resource requires networking Sep 13 00:53:00.691043 ignition[818]: Ignition finished successfully Sep 13 00:53:00.698301 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:53:00.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.701458 systemd[1]: Starting ignition-fetch.service... Sep 13 00:53:00.710274 ignition[839]: Ignition 2.14.0 Sep 13 00:53:00.710285 ignition[839]: Stage: fetch Sep 13 00:53:00.710412 ignition[839]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:00.710441 ignition[839]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:00.715606 ignition[839]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:00.715740 ignition[839]: parsed url from cmdline: "" Sep 13 00:53:00.715743 ignition[839]: no config URL provided Sep 13 00:53:00.715748 ignition[839]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:53:00.715757 ignition[839]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:53:00.715793 ignition[839]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 00:53:00.787181 ignition[839]: GET result: OK Sep 13 00:53:00.787269 ignition[839]: config has been read from IMDS userdata Sep 13 00:53:00.787288 ignition[839]: parsing config with SHA512: 8a0a72f08e434636fb288c715e3550e8113a3a7e8e79841574c658987680c2b1e1c7304764a05a5c6283056c8b1f98a22c48ef28bfed150238b24aa4f1e15c78 Sep 13 00:53:00.790184 unknown[839]: fetched base config from "system" Sep 13 00:53:00.790551 ignition[839]: fetch: fetch complete Sep 13 00:53:00.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.790191 unknown[839]: fetched base config from "system" Sep 13 00:53:00.790556 ignition[839]: fetch: fetch passed Sep 13 00:53:00.790195 unknown[839]: fetched user config from "azure" Sep 13 00:53:00.790597 ignition[839]: Ignition finished successfully Sep 13 00:53:00.792081 systemd[1]: Finished ignition-fetch.service. Sep 13 00:53:00.796478 systemd[1]: Starting ignition-kargs.service... Sep 13 00:53:00.809637 ignition[845]: Ignition 2.14.0 Sep 13 00:53:00.809645 ignition[845]: Stage: kargs Sep 13 00:53:00.809750 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:00.809783 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:00.818601 systemd[1]: Finished ignition-kargs.service. Sep 13 00:53:00.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.814467 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:00.821577 systemd[1]: Starting ignition-disks.service... Sep 13 00:53:00.816000 ignition[845]: kargs: kargs passed Sep 13 00:53:00.816063 ignition[845]: Ignition finished successfully Sep 13 00:53:00.830527 ignition[851]: Ignition 2.14.0 Sep 13 00:53:00.830533 ignition[851]: Stage: disks Sep 13 00:53:00.830641 ignition[851]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:00.830680 ignition[851]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:00.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.838262 systemd[1]: Finished ignition-disks.service. Sep 13 00:53:00.836255 ignition[851]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:00.842893 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:53:00.837477 ignition[851]: disks: disks passed Sep 13 00:53:00.846951 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:53:00.837523 ignition[851]: Ignition finished successfully Sep 13 00:53:00.847043 systemd[1]: Reached target local-fs.target. Sep 13 00:53:00.847801 systemd[1]: Reached target sysinit.target. Sep 13 00:53:00.848196 systemd[1]: Reached target basic.target. Sep 13 00:53:00.849411 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:53:00.875720 systemd-fsck[859]: ROOT: clean, 629/7326000 files, 481084/7359488 blocks Sep 13 00:53:00.879944 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:53:00.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:00.884937 systemd[1]: Mounting sysroot.mount... Sep 13 00:53:00.902216 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:53:00.902190 systemd[1]: Mounted sysroot.mount. Sep 13 00:53:00.903859 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:53:00.913162 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:53:00.918141 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 00:53:00.922485 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:53:00.922601 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:53:00.932450 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:53:00.947161 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:53:00.951846 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:53:00.970641 initrd-setup-root[874]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:53:00.973748 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (869) Sep 13 00:53:00.983699 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:53:00.983737 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:53:00.983750 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:53:00.987252 initrd-setup-root[882]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:53:00.995682 initrd-setup-root[906]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:53:01.000936 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:53:01.010324 initrd-setup-root[916]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:53:01.150033 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:53:01.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:01.153458 systemd[1]: Starting ignition-mount.service... Sep 13 00:53:01.160233 systemd[1]: Starting sysroot-boot.service... Sep 13 00:53:01.168142 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:53:01.168270 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:53:01.186905 ignition[937]: INFO : Ignition 2.14.0 Sep 13 00:53:01.189455 ignition[937]: INFO : Stage: mount Sep 13 00:53:01.191527 ignition[937]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:01.195071 ignition[937]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:01.201174 ignition[937]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:01.206398 ignition[937]: INFO : mount: mount passed Sep 13 00:53:01.206398 ignition[937]: INFO : Ignition finished successfully Sep 13 00:53:01.227261 kernel: kauditd_printk_skb: 24 callbacks suppressed Sep 13 00:53:01.227304 kernel: audit: type=1130 audit(1757724781.206:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:01.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:01.202110 systemd[1]: Finished ignition-mount.service. Sep 13 00:53:01.234366 systemd[1]: Finished sysroot-boot.service. Sep 13 00:53:01.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:01.249219 kernel: audit: type=1130 audit(1757724781.236:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:01.303468 coreos-metadata[868]: Sep 13 00:53:01.303 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 00:53:01.309105 coreos-metadata[868]: Sep 13 00:53:01.309 INFO Fetch successful Sep 13 00:53:01.341607 coreos-metadata[868]: Sep 13 00:53:01.341 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 00:53:01.353556 coreos-metadata[868]: Sep 13 00:53:01.353 INFO Fetch successful Sep 13 00:53:01.358275 coreos-metadata[868]: Sep 13 00:53:01.358 INFO wrote hostname ci-3510.3.8-n-ad8a68f24a to /sysroot/etc/hostname Sep 13 00:53:01.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:01.359814 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 00:53:01.379260 kernel: audit: type=1130 audit(1757724781.365:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:01.366308 systemd[1]: Starting ignition-files.service... Sep 13 00:53:01.388177 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:53:01.406224 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (948) Sep 13 00:53:01.414862 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:53:01.414901 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:53:01.414917 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:53:01.425314 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:53:01.436249 ignition[967]: INFO : Ignition 2.14.0 Sep 13 00:53:01.438773 ignition[967]: INFO : Stage: files Sep 13 00:53:01.438773 ignition[967]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:01.438773 ignition[967]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:01.453400 ignition[967]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:01.457363 ignition[967]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:53:01.462284 ignition[967]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:53:01.462284 ignition[967]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:53:01.475921 ignition[967]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:53:01.480874 ignition[967]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:53:01.484634 ignition[967]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:53:01.482066 unknown[967]: wrote ssh authorized keys file for user: core Sep 13 00:53:01.490320 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:53:01.490320 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:53:01.490320 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:53:01.490320 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:53:01.490320 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:53:01.490320 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem850759637" Sep 13 00:53:01.520276 ignition[967]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem850759637": device or resource busy Sep 13 00:53:01.520276 ignition[967]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem850759637", trying btrfs: device or resource busy Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem850759637" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem850759637" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem850759637" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem850759637" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:53:01.520276 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3713304706" Sep 13 00:53:01.520276 ignition[967]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3713304706": device or resource busy Sep 13 00:53:01.587625 ignition[967]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3713304706", trying btrfs: device or resource busy Sep 13 00:53:01.587625 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3713304706" Sep 13 00:53:01.587625 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3713304706" Sep 13 00:53:01.587625 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3713304706" Sep 13 00:53:01.587625 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3713304706" Sep 13 00:53:01.587625 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:53:01.587625 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:53:01.587625 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Sep 13 00:53:01.775457 systemd-networkd[812]: eth0: Gained IPv6LL Sep 13 00:53:02.016427 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 13 00:53:02.196854 ignition[967]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:53:02.196854 ignition[967]: INFO : files: op(f): [started] processing unit "nvidia.service" Sep 13 00:53:02.196854 ignition[967]: INFO : files: op(f): [finished] processing unit "nvidia.service" Sep 13 00:53:02.196854 ignition[967]: INFO : files: op(10): [started] processing unit "waagent.service" Sep 13 00:53:02.196854 ignition[967]: INFO : files: op(10): [finished] processing unit "waagent.service" Sep 13 00:53:02.196854 ignition[967]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Sep 13 00:53:02.221630 ignition[967]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:53:02.221630 ignition[967]: INFO : files: op(12): [started] setting preset to enabled for "waagent.service" Sep 13 00:53:02.221630 ignition[967]: INFO : files: op(12): [finished] setting preset to enabled for "waagent.service" Sep 13 00:53:02.221630 ignition[967]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:53:02.237471 ignition[967]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:53:02.237471 ignition[967]: INFO : files: files passed Sep 13 00:53:02.237471 ignition[967]: INFO : Ignition finished successfully Sep 13 00:53:02.247112 systemd[1]: Finished ignition-files.service. Sep 13 00:53:02.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.252405 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:53:02.274246 kernel: audit: type=1130 audit(1757724782.249:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.268052 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:53:02.268971 systemd[1]: Starting ignition-quench.service... Sep 13 00:53:02.285069 initrd-setup-root-after-ignition[990]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:53:02.299989 kernel: audit: type=1130 audit(1757724782.285:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.274100 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:53:02.302688 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:53:02.305230 systemd[1]: Finished ignition-quench.service. Sep 13 00:53:02.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.310446 systemd[1]: Reached target ignition-complete.target. Sep 13 00:53:02.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.334246 kernel: audit: type=1130 audit(1757724782.310:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.334307 kernel: audit: type=1131 audit(1757724782.310:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.336149 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:53:02.349405 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:53:02.349529 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:53:02.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.354375 systemd[1]: Reached target initrd-fs.target. Sep 13 00:53:02.382197 kernel: audit: type=1130 audit(1757724782.354:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.382238 kernel: audit: type=1131 audit(1757724782.354:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.382187 systemd[1]: Reached target initrd.target. Sep 13 00:53:02.385888 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:53:02.389522 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:53:02.399996 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:53:02.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.405410 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:53:02.421347 kernel: audit: type=1130 audit(1757724782.404:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.426046 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:53:02.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.426287 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:53:02.500569 ignition[1005]: INFO : Ignition 2.14.0 Sep 13 00:53:02.500569 ignition[1005]: INFO : Stage: umount Sep 13 00:53:02.500569 ignition[1005]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:02.500569 ignition[1005]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:02.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.426756 systemd[1]: Stopped target timers.target. Sep 13 00:53:02.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.532862 ignition[1005]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:02.532862 ignition[1005]: INFO : umount: umount passed Sep 13 00:53:02.532862 ignition[1005]: INFO : Ignition finished successfully Sep 13 00:53:02.427117 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:53:02.427255 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:53:02.427615 systemd[1]: Stopped target initrd.target. Sep 13 00:53:02.427905 systemd[1]: Stopped target basic.target. Sep 13 00:53:02.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.428291 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:53:02.428684 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:53:02.429078 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:53:02.429475 systemd[1]: Stopped target remote-fs.target. Sep 13 00:53:02.429836 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:53:02.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.430247 systemd[1]: Stopped target sysinit.target. Sep 13 00:53:02.430635 systemd[1]: Stopped target local-fs.target. Sep 13 00:53:02.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.431010 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:53:02.431437 systemd[1]: Stopped target swap.target. Sep 13 00:53:02.590000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:53:02.431866 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:53:02.432006 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:53:02.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.432577 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:53:02.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.432863 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:53:02.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.432984 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:53:02.433411 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:53:02.433533 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:53:02.433829 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:53:02.433949 systemd[1]: Stopped ignition-files.service. Sep 13 00:53:02.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.434429 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 00:53:02.434554 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 00:53:02.435937 systemd[1]: Stopping ignition-mount.service... Sep 13 00:53:02.440645 systemd[1]: Stopping iscsiuio.service... Sep 13 00:53:02.440991 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:53:02.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.441156 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:53:02.481569 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:53:02.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.481678 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:53:02.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.481849 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:53:02.482670 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:53:02.482808 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:53:02.488840 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:53:02.489066 systemd[1]: Stopped iscsiuio.service. Sep 13 00:53:02.491902 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:53:02.493280 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:53:02.504794 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:53:02.696197 kernel: hv_netvsc 7c1e5279-7a95-7c1e-5279-7a957c1e5279 eth0: Data path switched from VF: enP43062s1 Sep 13 00:53:02.505744 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:53:02.505828 systemd[1]: Stopped ignition-mount.service. Sep 13 00:53:02.513888 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:53:02.513948 systemd[1]: Stopped ignition-disks.service. Sep 13 00:53:02.519630 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:53:02.519681 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:53:02.522259 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:53:02.522296 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:53:02.526518 systemd[1]: Stopped target network.target. Sep 13 00:53:02.528575 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:53:02.528628 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:53:02.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.530878 systemd[1]: Stopped target paths.target. Sep 13 00:53:02.532840 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:53:02.539243 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:53:02.543312 systemd[1]: Stopped target slices.target. Sep 13 00:53:02.545464 systemd[1]: Stopped target sockets.target. Sep 13 00:53:02.550026 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:53:02.550065 systemd[1]: Closed iscsid.socket. Sep 13 00:53:02.554249 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:53:02.554290 systemd[1]: Closed iscsiuio.socket. Sep 13 00:53:02.558127 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:53:02.558172 systemd[1]: Stopped ignition-setup.service. Sep 13 00:53:02.563224 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:53:02.567257 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:53:02.574291 systemd-networkd[812]: eth0: DHCPv6 lease lost Sep 13 00:53:02.749000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:53:02.576499 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:53:02.576597 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:53:02.583162 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:53:02.583272 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:53:02.590370 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:53:02.590403 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:53:02.595289 systemd[1]: Stopping network-cleanup.service... Sep 13 00:53:02.599686 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:53:02.599768 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:53:02.604314 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:53:02.604357 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:53:02.609255 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:53:02.609303 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:53:02.622377 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:53:02.629416 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:53:02.630048 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:53:02.630213 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:53:02.637586 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:53:02.637630 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:53:02.643556 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:53:02.643593 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:53:02.647987 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:53:02.648041 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:53:02.650317 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:53:02.650368 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:53:02.655238 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:53:02.655285 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:53:02.660286 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:53:02.664296 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:53:02.664355 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:53:02.668622 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:53:02.668743 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:53:02.715981 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:53:02.716093 systemd[1]: Stopped network-cleanup.service. Sep 13 00:53:02.910264 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:53:02.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.910387 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:53:02.914535 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:53:02.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:02.918501 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:53:02.918572 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:53:02.924008 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:53:02.936644 systemd[1]: Switching root. Sep 13 00:53:02.962762 iscsid[819]: iscsid shutting down. Sep 13 00:53:02.964791 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). Sep 13 00:53:02.964865 systemd-journald[183]: Journal stopped Sep 13 00:53:07.861367 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:53:07.861406 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:53:07.861425 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:53:07.861439 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:53:07.861453 kernel: SELinux: policy capability open_perms=1 Sep 13 00:53:07.861468 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:53:07.861485 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:53:07.861502 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:53:07.861517 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:53:07.861531 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:53:07.861546 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:53:07.861562 systemd[1]: Successfully loaded SELinux policy in 118.136ms. Sep 13 00:53:07.861579 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.409ms. Sep 13 00:53:07.861599 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:53:07.861619 systemd[1]: Detected virtualization microsoft. Sep 13 00:53:07.861635 systemd[1]: Detected architecture x86-64. Sep 13 00:53:07.861651 systemd[1]: Detected first boot. Sep 13 00:53:07.861669 systemd[1]: Hostname set to . Sep 13 00:53:07.861685 systemd[1]: Initializing machine ID from random generator. Sep 13 00:53:07.861704 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:53:07.861720 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:53:07.861737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:53:07.861755 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:53:07.861774 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:53:07.861791 kernel: kauditd_printk_skb: 51 callbacks suppressed Sep 13 00:53:07.861806 kernel: audit: type=1334 audit(1757724787.385:89): prog-id=12 op=LOAD Sep 13 00:53:07.861824 kernel: audit: type=1334 audit(1757724787.385:90): prog-id=3 op=UNLOAD Sep 13 00:53:07.861839 kernel: audit: type=1334 audit(1757724787.391:91): prog-id=13 op=LOAD Sep 13 00:53:07.861855 kernel: audit: type=1334 audit(1757724787.397:92): prog-id=14 op=LOAD Sep 13 00:53:07.861870 kernel: audit: type=1334 audit(1757724787.397:93): prog-id=4 op=UNLOAD Sep 13 00:53:07.861885 kernel: audit: type=1334 audit(1757724787.397:94): prog-id=5 op=UNLOAD Sep 13 00:53:07.861900 kernel: audit: type=1334 audit(1757724787.403:95): prog-id=15 op=LOAD Sep 13 00:53:07.861916 kernel: audit: type=1334 audit(1757724787.403:96): prog-id=12 op=UNLOAD Sep 13 00:53:07.861931 kernel: audit: type=1334 audit(1757724787.420:97): prog-id=16 op=LOAD Sep 13 00:53:07.861949 kernel: audit: type=1334 audit(1757724787.431:98): prog-id=17 op=LOAD Sep 13 00:53:07.861964 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:53:07.861980 systemd[1]: Stopped iscsid.service. Sep 13 00:53:07.861998 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:53:07.862015 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:53:07.862033 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:53:07.862055 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:53:07.862073 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:53:07.862089 systemd[1]: Created slice system-getty.slice. Sep 13 00:53:07.862106 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:53:07.862122 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:53:07.862138 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:53:07.862152 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:53:07.862166 systemd[1]: Created slice user.slice. Sep 13 00:53:07.862175 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:53:07.862187 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:53:07.862222 systemd[1]: Set up automount boot.automount. Sep 13 00:53:07.862235 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:53:07.862245 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:53:07.862259 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:53:07.862277 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:53:07.862291 systemd[1]: Reached target integritysetup.target. Sep 13 00:53:07.862304 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:53:07.862314 systemd[1]: Reached target remote-fs.target. Sep 13 00:53:07.862338 systemd[1]: Reached target slices.target. Sep 13 00:53:07.862355 systemd[1]: Reached target swap.target. Sep 13 00:53:07.862370 systemd[1]: Reached target torcx.target. Sep 13 00:53:07.862390 systemd[1]: Reached target veritysetup.target. Sep 13 00:53:07.862403 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:53:07.862430 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:53:07.862452 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:53:07.862464 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:53:07.862474 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:53:07.862491 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:53:07.862509 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:53:07.862522 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:53:07.862537 systemd[1]: Mounting media.mount... Sep 13 00:53:07.862547 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:07.862561 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:53:07.862574 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:53:07.862584 systemd[1]: Mounting tmp.mount... Sep 13 00:53:07.862605 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:53:07.862623 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:07.862638 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:53:07.862651 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:53:07.862663 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:53:07.862677 systemd[1]: Starting modprobe@drm.service... Sep 13 00:53:07.862691 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:53:07.862701 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:53:07.862713 systemd[1]: Starting modprobe@loop.service... Sep 13 00:53:07.862732 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:53:07.862744 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:53:07.862756 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:53:07.862768 kernel: loop: module loaded Sep 13 00:53:07.862777 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:53:07.862791 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:53:07.862805 systemd[1]: Stopped systemd-journald.service. Sep 13 00:53:07.862814 kernel: fuse: init (API version 7.34) Sep 13 00:53:07.862825 systemd[1]: Starting systemd-journald.service... Sep 13 00:53:07.862840 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:53:07.862850 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:53:07.862863 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:53:07.862878 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:53:07.862890 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:53:07.862906 systemd[1]: Stopped verity-setup.service. Sep 13 00:53:07.862923 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:07.862935 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:53:07.862952 systemd-journald[1147]: Journal started Sep 13 00:53:07.863004 systemd-journald[1147]: Runtime Journal (/run/log/journal/caf9ac0e38c64ceca5f69d6d63891bd8) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:53:03.530000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:53:03.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:53:03.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:53:03.750000 audit: BPF prog-id=10 op=LOAD Sep 13 00:53:03.750000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:53:03.750000 audit: BPF prog-id=11 op=LOAD Sep 13 00:53:03.750000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:53:04.060000 audit[1038]: AVC avc: denied { associate } for pid=1038 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:53:04.060000 audit[1038]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024314 a1=c00002a3d8 a2=c000028840 a3=32 items=0 ppid=1021 pid=1038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.060000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:53:04.067000 audit[1038]: AVC avc: denied { associate } for pid=1038 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:53:04.067000 audit[1038]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000243f9 a2=1ed a3=0 items=2 ppid=1021 pid=1038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:04.067000 audit: CWD cwd="/" Sep 13 00:53:04.067000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:04.067000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:04.067000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:53:07.385000 audit: BPF prog-id=12 op=LOAD Sep 13 00:53:07.385000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:53:07.391000 audit: BPF prog-id=13 op=LOAD Sep 13 00:53:07.397000 audit: BPF prog-id=14 op=LOAD Sep 13 00:53:07.397000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:53:07.397000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:53:07.403000 audit: BPF prog-id=15 op=LOAD Sep 13 00:53:07.403000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:53:07.420000 audit: BPF prog-id=16 op=LOAD Sep 13 00:53:07.431000 audit: BPF prog-id=17 op=LOAD Sep 13 00:53:07.431000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:53:07.431000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:53:07.438000 audit: BPF prog-id=18 op=LOAD Sep 13 00:53:07.438000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:53:07.443000 audit: BPF prog-id=19 op=LOAD Sep 13 00:53:07.449000 audit: BPF prog-id=20 op=LOAD Sep 13 00:53:07.449000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:53:07.449000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:53:07.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.473000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:53:07.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.804000 audit: BPF prog-id=21 op=LOAD Sep 13 00:53:07.804000 audit: BPF prog-id=22 op=LOAD Sep 13 00:53:07.804000 audit: BPF prog-id=23 op=LOAD Sep 13 00:53:07.804000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:53:07.804000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:53:07.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.852000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:53:07.852000 audit[1147]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffca2e7a2e0 a2=4000 a3=7ffca2e7a37c items=0 ppid=1 pid=1147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:07.852000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:53:04.041321 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:53:07.384463 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:53:04.047574 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:53:07.384475 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 00:53:04.047591 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:53:07.450663 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:53:04.047621 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:53:04.047631 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:53:04.047666 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:53:04.047677 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:53:04.047843 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:53:04.047881 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:53:04.047894 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:53:04.057085 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:53:04.057133 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:53:04.057152 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:53:04.057165 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:53:04.057181 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:53:04.057219 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:53:06.354438 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:06.354873 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:06.354969 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:06.355121 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:06.355163 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:53:06.355238 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-09-13T00:53:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:53:07.875936 systemd[1]: Started systemd-journald.service. Sep 13 00:53:07.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.874137 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:53:07.876390 systemd[1]: Mounted media.mount. Sep 13 00:53:07.878396 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:53:07.880573 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:53:07.882838 systemd[1]: Mounted tmp.mount. Sep 13 00:53:07.884985 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:53:07.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.887651 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:53:07.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.890277 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:53:07.890564 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:53:07.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.893493 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:53:07.893777 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:53:07.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.896450 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:53:07.896733 systemd[1]: Finished modprobe@drm.service. Sep 13 00:53:07.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.899315 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:53:07.899560 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:53:07.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.902344 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:53:07.902699 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:53:07.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.905269 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:53:07.905529 systemd[1]: Finished modprobe@loop.service. Sep 13 00:53:07.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.910840 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:53:07.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.914119 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:53:07.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.917771 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:53:07.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.920411 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:53:07.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.923695 systemd[1]: Reached target network-pre.target. Sep 13 00:53:07.927439 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:53:07.930845 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:53:07.933836 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:53:07.961440 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:53:07.964147 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:53:07.965982 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:53:07.967259 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:53:07.969845 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:53:07.971548 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:53:07.976342 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:53:07.979393 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:53:07.992582 systemd-journald[1147]: Time spent on flushing to /var/log/journal/caf9ac0e38c64ceca5f69d6d63891bd8 is 24.278ms for 1135 entries. Sep 13 00:53:07.992582 systemd-journald[1147]: System Journal (/var/log/journal/caf9ac0e38c64ceca5f69d6d63891bd8) is 8.0M, max 2.6G, 2.6G free. Sep 13 00:53:08.043701 systemd-journald[1147]: Received client request to flush runtime journal. Sep 13 00:53:08.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:08.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:07.983847 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:53:08.044516 udevadm[1161]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 13 00:53:07.986319 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:53:08.006678 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:53:08.009402 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:53:08.036988 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:53:08.044512 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:53:08.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:08.163216 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:53:08.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:08.528042 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:53:08.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:08.531000 audit: BPF prog-id=24 op=LOAD Sep 13 00:53:08.531000 audit: BPF prog-id=25 op=LOAD Sep 13 00:53:08.531000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:53:08.531000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:53:08.531920 systemd[1]: Starting systemd-udevd.service... Sep 13 00:53:08.548628 systemd-udevd[1164]: Using default interface naming scheme 'v252'. Sep 13 00:53:08.794526 systemd[1]: Started systemd-udevd.service. Sep 13 00:53:08.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:08.797000 audit: BPF prog-id=26 op=LOAD Sep 13 00:53:08.798868 systemd[1]: Starting systemd-networkd.service... Sep 13 00:53:08.831000 audit: BPF prog-id=27 op=LOAD Sep 13 00:53:08.831000 audit: BPF prog-id=28 op=LOAD Sep 13 00:53:08.831000 audit: BPF prog-id=29 op=LOAD Sep 13 00:53:08.832992 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:53:08.871030 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:53:08.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:08.892379 systemd[1]: Started systemd-userdbd.service. Sep 13 00:53:08.900000 audit[1165]: AVC avc: denied { confidentiality } for pid=1165 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:53:08.909219 kernel: hv_vmbus: registering driver hv_balloon Sep 13 00:53:08.938282 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:53:08.955457 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 00:53:08.955523 kernel: hv_vmbus: registering driver hv_utils Sep 13 00:53:08.968264 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 00:53:08.973259 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 00:53:08.982456 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 00:53:08.982544 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 00:53:09.332578 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 00:53:09.332642 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 00:53:09.341176 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 00:53:09.345031 kernel: Console: switching to colour dummy device 80x25 Sep 13 00:53:09.353721 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:53:09.363163 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#213 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:53:08.900000 audit[1165]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558fe26a5b70 a1=f83c a2=7fb6d319bbc5 a3=5 items=12 ppid=1164 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:08.900000 audit: CWD cwd="/" Sep 13 00:53:08.900000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=1 name=(null) inode=14650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=2 name=(null) inode=14650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=3 name=(null) inode=14651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=4 name=(null) inode=14650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=5 name=(null) inode=14652 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=6 name=(null) inode=14650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=7 name=(null) inode=14653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=8 name=(null) inode=14650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=9 name=(null) inode=14654 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=10 name=(null) inode=14650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PATH item=11 name=(null) inode=14655 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:08.900000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:53:09.507830 systemd-networkd[1170]: lo: Link UP Sep 13 00:53:09.507842 systemd-networkd[1170]: lo: Gained carrier Sep 13 00:53:09.508469 systemd-networkd[1170]: Enumeration completed Sep 13 00:53:09.508945 systemd[1]: Started systemd-networkd.service. Sep 13 00:53:09.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:09.512722 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:53:09.515677 systemd-networkd[1170]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:53:09.531098 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:53:09.553475 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Sep 13 00:53:09.568150 kernel: mlx5_core a836:00:02.0 enP43062s1: Link up Sep 13 00:53:09.572148 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:53:09.597148 kernel: hv_netvsc 7c1e5279-7a95-7c1e-5279-7a957c1e5279 eth0: Data path switched to VF: enP43062s1 Sep 13 00:53:09.597623 systemd-networkd[1170]: enP43062s1: Link UP Sep 13 00:53:09.597860 systemd-networkd[1170]: eth0: Link UP Sep 13 00:53:09.597923 systemd-networkd[1170]: eth0: Gained carrier Sep 13 00:53:09.602857 systemd-networkd[1170]: enP43062s1: Gained carrier Sep 13 00:53:09.608245 systemd-networkd[1170]: eth0: DHCPv4 address 10.200.4.19/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:53:09.666476 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:53:09.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:09.670285 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:53:09.735970 lvm[1242]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:53:09.764038 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:53:09.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:09.766958 systemd[1]: Reached target cryptsetup.target. Sep 13 00:53:09.770435 systemd[1]: Starting lvm2-activation.service... Sep 13 00:53:09.774954 lvm[1243]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:53:09.795959 systemd[1]: Finished lvm2-activation.service. Sep 13 00:53:09.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:09.798793 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:53:09.801005 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:53:09.801036 systemd[1]: Reached target local-fs.target. Sep 13 00:53:09.803080 systemd[1]: Reached target machines.target. Sep 13 00:53:09.806284 systemd[1]: Starting ldconfig.service... Sep 13 00:53:09.813873 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:09.813949 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:09.814912 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:53:09.817936 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:53:09.821822 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:53:09.825104 systemd[1]: Starting systemd-sysext.service... Sep 13 00:53:09.838188 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1245 (bootctl) Sep 13 00:53:09.839403 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:53:10.312344 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:53:10.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.316819 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:53:10.327634 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:53:10.327785 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:53:10.363148 kernel: loop0: detected capacity change from 0 to 221472 Sep 13 00:53:10.407162 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:53:10.427161 kernel: loop1: detected capacity change from 0 to 221472 Sep 13 00:53:10.437628 (sd-sysext)[1258]: Using extensions 'kubernetes'. Sep 13 00:53:10.438040 (sd-sysext)[1258]: Merged extensions into '/usr'. Sep 13 00:53:10.453424 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:10.454964 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:53:10.457274 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:10.460643 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:53:10.464510 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:53:10.467898 systemd[1]: Starting modprobe@loop.service... Sep 13 00:53:10.470122 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:10.470291 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:10.470419 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:10.473062 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:53:10.476025 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:53:10.476193 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:53:10.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.479116 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:53:10.479297 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:53:10.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.482712 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:53:10.482821 systemd[1]: Finished modprobe@loop.service. Sep 13 00:53:10.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.485769 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:53:10.485904 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:53:10.487158 systemd[1]: Finished systemd-sysext.service. Sep 13 00:53:10.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.490728 systemd[1]: Starting ensure-sysext.service... Sep 13 00:53:10.494391 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:53:10.501686 systemd[1]: Reloading. Sep 13 00:53:10.572696 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:53:10.574565 /usr/lib/systemd/system-generators/torcx-generator[1285]: time="2025-09-13T00:53:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:53:10.574601 /usr/lib/systemd/system-generators/torcx-generator[1285]: time="2025-09-13T00:53:10Z" level=info msg="torcx already run" Sep 13 00:53:10.612539 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:53:10.636372 systemd-fsck[1255]: fsck.fat 4.2 (2021-01-31) Sep 13 00:53:10.636372 systemd-fsck[1255]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 00:53:10.663782 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:53:10.674346 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:53:10.674363 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:53:10.688697 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:53:10.747203 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:53:10.748000 audit: BPF prog-id=30 op=LOAD Sep 13 00:53:10.748000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:53:10.748000 audit: BPF prog-id=31 op=LOAD Sep 13 00:53:10.748000 audit: BPF prog-id=32 op=LOAD Sep 13 00:53:10.748000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:53:10.748000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:53:10.749000 audit: BPF prog-id=33 op=LOAD Sep 13 00:53:10.749000 audit: BPF prog-id=34 op=LOAD Sep 13 00:53:10.749000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:53:10.749000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:53:10.751000 audit: BPF prog-id=35 op=LOAD Sep 13 00:53:10.751000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:53:10.753000 audit: BPF prog-id=36 op=LOAD Sep 13 00:53:10.753000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:53:10.753000 audit: BPF prog-id=37 op=LOAD Sep 13 00:53:10.753000 audit: BPF prog-id=38 op=LOAD Sep 13 00:53:10.753000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:53:10.753000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:53:10.759274 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:53:10.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.762288 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:53:10.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.772225 systemd[1]: Mounting boot.mount... Sep 13 00:53:10.778571 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:10.778811 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:10.780278 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:53:10.784124 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:53:10.787558 systemd[1]: Starting modprobe@loop.service... Sep 13 00:53:10.789615 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:10.790031 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:10.790523 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:10.793113 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:53:10.793288 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:53:10.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.797601 systemd[1]: Mounted boot.mount. Sep 13 00:53:10.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.800422 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:53:10.800579 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:53:10.803305 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:53:10.803437 systemd[1]: Finished modprobe@loop.service. Sep 13 00:53:10.813244 systemd[1]: Finished ensure-sysext.service. Sep 13 00:53:10.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.816907 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:10.818606 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:53:10.822899 systemd[1]: Starting modprobe@drm.service... Sep 13 00:53:10.826140 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:53:10.830753 systemd[1]: Starting modprobe@loop.service... Sep 13 00:53:10.833377 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:10.833444 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:10.834295 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:53:10.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.836725 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:53:10.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.836876 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:53:10.839357 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:53:10.839512 systemd[1]: Finished modprobe@drm.service. Sep 13 00:53:10.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.841941 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:53:10.842089 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:53:10.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.844801 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:53:10.844939 systemd[1]: Finished modprobe@loop.service. Sep 13 00:53:10.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:10.847467 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:53:10.847521 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:53:11.269258 systemd-networkd[1170]: eth0: Gained IPv6LL Sep 13 00:53:11.273878 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:53:11.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:11.326892 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:11.326924 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:11.418123 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:53:11.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:11.421977 systemd[1]: Starting audit-rules.service... Sep 13 00:53:11.425024 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:53:11.428758 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:53:11.431000 audit: BPF prog-id=39 op=LOAD Sep 13 00:53:11.433288 systemd[1]: Starting systemd-resolved.service... Sep 13 00:53:11.437217 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:53:11.435000 audit: BPF prog-id=40 op=LOAD Sep 13 00:53:11.440957 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:53:11.455000 audit[1364]: SYSTEM_BOOT pid=1364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:53:11.457842 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:53:11.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:11.460844 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:53:11.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:11.463806 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:53:11.537429 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:53:11.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:11.549119 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:53:11.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:11.551755 systemd[1]: Reached target time-set.target. Sep 13 00:53:11.556689 systemd-resolved[1362]: Positive Trust Anchors: Sep 13 00:53:11.556890 systemd-resolved[1362]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:53:11.556953 systemd-resolved[1362]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:53:11.570189 augenrules[1379]: No rules Sep 13 00:53:11.568000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:53:11.568000 audit[1379]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc250b1fc0 a2=420 a3=0 items=0 ppid=1359 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:11.568000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:53:11.570790 systemd[1]: Finished audit-rules.service. Sep 13 00:53:11.579025 systemd-resolved[1362]: Using system hostname 'ci-3510.3.8-n-ad8a68f24a'. Sep 13 00:53:11.580393 systemd[1]: Started systemd-resolved.service. Sep 13 00:53:11.583642 systemd[1]: Reached target network.target. Sep 13 00:53:11.585904 systemd[1]: Reached target network-online.target. Sep 13 00:53:11.588437 systemd[1]: Reached target nss-lookup.target. Sep 13 00:53:11.597697 systemd-timesyncd[1363]: Contacted time server 131.111.8.60:123 (0.flatcar.pool.ntp.org). Sep 13 00:53:11.597758 systemd-timesyncd[1363]: Initial clock synchronization to Sat 2025-09-13 00:53:11.597850 UTC. Sep 13 00:53:12.496117 ldconfig[1244]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:53:12.510932 systemd[1]: Finished ldconfig.service. Sep 13 00:53:12.514085 systemd[1]: Starting systemd-update-done.service... Sep 13 00:53:12.524478 systemd[1]: Finished systemd-update-done.service. Sep 13 00:53:12.526874 systemd[1]: Reached target sysinit.target. Sep 13 00:53:12.529105 systemd[1]: Started motdgen.path. Sep 13 00:53:12.530935 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:53:12.533935 systemd[1]: Started logrotate.timer. Sep 13 00:53:12.535834 systemd[1]: Started mdadm.timer. Sep 13 00:53:12.537484 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:53:12.539825 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:53:12.539867 systemd[1]: Reached target paths.target. Sep 13 00:53:12.541980 systemd[1]: Reached target timers.target. Sep 13 00:53:12.544570 systemd[1]: Listening on dbus.socket. Sep 13 00:53:12.547554 systemd[1]: Starting docker.socket... Sep 13 00:53:12.556696 systemd[1]: Listening on sshd.socket. Sep 13 00:53:12.559177 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:12.559582 systemd[1]: Listening on docker.socket. Sep 13 00:53:12.561821 systemd[1]: Reached target sockets.target. Sep 13 00:53:12.564079 systemd[1]: Reached target basic.target. Sep 13 00:53:12.566306 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:53:12.566344 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:53:12.567233 systemd[1]: Starting containerd.service... Sep 13 00:53:12.570186 systemd[1]: Starting dbus.service... Sep 13 00:53:12.572983 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:53:12.576236 systemd[1]: Starting extend-filesystems.service... Sep 13 00:53:12.578600 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:53:12.582579 systemd[1]: Starting kubelet.service... Sep 13 00:53:12.586835 systemd[1]: Starting motdgen.service... Sep 13 00:53:12.589682 systemd[1]: Started nvidia.service. Sep 13 00:53:12.592871 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:53:12.596768 systemd[1]: Starting sshd-keygen.service... Sep 13 00:53:12.600518 jq[1390]: false Sep 13 00:53:12.602808 systemd[1]: Starting systemd-logind.service... Sep 13 00:53:12.605402 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:12.605500 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:53:12.606016 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:53:12.607729 systemd[1]: Starting update-engine.service... Sep 13 00:53:12.611728 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:53:12.620799 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:53:12.621027 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:53:12.621414 jq[1403]: true Sep 13 00:53:12.627649 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:53:12.627838 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:53:12.646156 jq[1409]: true Sep 13 00:53:12.666613 extend-filesystems[1391]: Found loop1 Sep 13 00:53:12.677874 extend-filesystems[1391]: Found sda Sep 13 00:53:12.679648 extend-filesystems[1391]: Found sda1 Sep 13 00:53:12.679648 extend-filesystems[1391]: Found sda2 Sep 13 00:53:12.679648 extend-filesystems[1391]: Found sda3 Sep 13 00:53:12.679648 extend-filesystems[1391]: Found usr Sep 13 00:53:12.679648 extend-filesystems[1391]: Found sda4 Sep 13 00:53:12.679648 extend-filesystems[1391]: Found sda6 Sep 13 00:53:12.679648 extend-filesystems[1391]: Found sda7 Sep 13 00:53:12.679648 extend-filesystems[1391]: Found sda9 Sep 13 00:53:12.679648 extend-filesystems[1391]: Checking size of /dev/sda9 Sep 13 00:53:12.697048 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:53:12.697275 systemd[1]: Finished motdgen.service. Sep 13 00:53:12.725950 extend-filesystems[1391]: Old size kept for /dev/sda9 Sep 13 00:53:12.733139 extend-filesystems[1391]: Found sr0 Sep 13 00:53:12.735758 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:53:12.735953 systemd[1]: Finished extend-filesystems.service. Sep 13 00:53:12.749123 systemd-logind[1399]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:53:12.751306 systemd-logind[1399]: New seat seat0. Sep 13 00:53:12.752908 dbus-daemon[1389]: [system] SELinux support is enabled Sep 13 00:53:12.753064 systemd[1]: Started dbus.service. Sep 13 00:53:12.757684 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:53:12.757720 systemd[1]: Reached target system-config.target. Sep 13 00:53:12.760341 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:53:12.760371 systemd[1]: Reached target user-config.target. Sep 13 00:53:12.765232 systemd[1]: Started systemd-logind.service. Sep 13 00:53:12.778757 env[1412]: time="2025-09-13T00:53:12.778708290Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:53:12.841149 bash[1440]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:53:12.841817 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:53:12.858431 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:53:12.879187 env[1412]: time="2025-09-13T00:53:12.879152058Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:53:12.880437 env[1412]: time="2025-09-13T00:53:12.880411475Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:53:12.886050 env[1412]: time="2025-09-13T00:53:12.886013251Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:53:12.887860 env[1412]: time="2025-09-13T00:53:12.887836676Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:53:12.888247 env[1412]: time="2025-09-13T00:53:12.888220381Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:53:12.890241 env[1412]: time="2025-09-13T00:53:12.890221308Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:53:12.890337 env[1412]: time="2025-09-13T00:53:12.890321310Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:53:12.890396 env[1412]: time="2025-09-13T00:53:12.890384011Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:53:12.890548 env[1412]: time="2025-09-13T00:53:12.890534113Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:53:12.890843 env[1412]: time="2025-09-13T00:53:12.890828417Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:53:12.891062 env[1412]: time="2025-09-13T00:53:12.891042420Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:53:12.891121 env[1412]: time="2025-09-13T00:53:12.891110021Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:53:12.891240 env[1412]: time="2025-09-13T00:53:12.891224422Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:53:12.891307 env[1412]: time="2025-09-13T00:53:12.891295623Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:53:12.905146 env[1412]: time="2025-09-13T00:53:12.904994510Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:53:12.905146 env[1412]: time="2025-09-13T00:53:12.905029510Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:53:12.905146 env[1412]: time="2025-09-13T00:53:12.905047210Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:53:12.905146 env[1412]: time="2025-09-13T00:53:12.905088511Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.905146 env[1412]: time="2025-09-13T00:53:12.905110311Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905391415Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905414015Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905440016Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905457516Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905476016Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905492916Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905510417Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905611118Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905689519Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905956323Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.905984023Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.906003923Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.906065024Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907477 env[1412]: time="2025-09-13T00:53:12.906082824Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906099525Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906115325Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906166326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906184826Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906202326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906218426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906249927Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906381728Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906411229Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906426829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906442629Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906478530Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906494730Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:53:12.907936 env[1412]: time="2025-09-13T00:53:12.906518030Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:53:12.908402 env[1412]: time="2025-09-13T00:53:12.906625832Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:53:12.908439 env[1412]: time="2025-09-13T00:53:12.907158039Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:53:12.908439 env[1412]: time="2025-09-13T00:53:12.907346742Z" level=info msg="Connect containerd service" Sep 13 00:53:12.908439 env[1412]: time="2025-09-13T00:53:12.907408742Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909221367Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909343669Z" level=info msg="Start subscribing containerd event" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909393070Z" level=info msg="Start recovering state" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909456170Z" level=info msg="Start event monitor" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909474271Z" level=info msg="Start snapshots syncer" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909486471Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909498171Z" level=info msg="Start streaming server" Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909568272Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909611872Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:53:12.918920 env[1412]: time="2025-09-13T00:53:12.909676173Z" level=info msg="containerd successfully booted in 0.131824s" Sep 13 00:53:12.909744 systemd[1]: Started containerd.service. Sep 13 00:53:12.929254 update_engine[1402]: I0913 00:53:12.925283 1402 main.cc:92] Flatcar Update Engine starting Sep 13 00:53:12.941036 systemd[1]: Started update-engine.service. Sep 13 00:53:12.945659 systemd[1]: Started locksmithd.service. Sep 13 00:53:12.949571 update_engine[1402]: I0913 00:53:12.948271 1402 update_check_scheduler.cc:74] Next update check in 11m47s Sep 13 00:53:13.579498 locksmithd[1470]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:53:14.014528 systemd[1]: Started kubelet.service. Sep 13 00:53:14.446586 sshd_keygen[1404]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:53:14.474427 systemd[1]: Finished sshd-keygen.service. Sep 13 00:53:14.478287 systemd[1]: Starting issuegen.service... Sep 13 00:53:14.481609 systemd[1]: Started waagent.service. Sep 13 00:53:14.489783 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:53:14.489964 systemd[1]: Finished issuegen.service. Sep 13 00:53:14.493250 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:53:14.508538 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:53:14.513160 systemd[1]: Started getty@tty1.service. Sep 13 00:53:14.516680 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:53:14.519261 systemd[1]: Reached target getty.target. Sep 13 00:53:14.521210 systemd[1]: Reached target multi-user.target. Sep 13 00:53:14.524373 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:53:14.533011 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:53:14.533176 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:53:14.535784 systemd[1]: Startup finished in 898ms (kernel) + 6.668s (initrd) + 10.833s (userspace) = 18.400s. Sep 13 00:53:14.701540 kubelet[1500]: E0913 00:53:14.701448 1500 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:53:14.703081 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:53:14.703252 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:53:14.703499 systemd[1]: kubelet.service: Consumed 1.192s CPU time. Sep 13 00:53:14.703901 login[1519]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:53:14.705508 login[1520]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:53:14.741075 systemd[1]: Created slice user-500.slice. Sep 13 00:53:14.742557 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:53:14.744888 systemd-logind[1399]: New session 2 of user core. Sep 13 00:53:14.748613 systemd-logind[1399]: New session 1 of user core. Sep 13 00:53:14.761397 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:53:14.763242 systemd[1]: Starting user@500.service... Sep 13 00:53:14.773772 (systemd)[1523]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:14.916949 systemd[1523]: Queued start job for default target default.target. Sep 13 00:53:14.917584 systemd[1523]: Reached target paths.target. Sep 13 00:53:14.917611 systemd[1523]: Reached target sockets.target. Sep 13 00:53:14.917627 systemd[1523]: Reached target timers.target. Sep 13 00:53:14.917641 systemd[1523]: Reached target basic.target. Sep 13 00:53:14.917754 systemd[1]: Started user@500.service. Sep 13 00:53:14.918911 systemd[1]: Started session-1.scope. Sep 13 00:53:14.919639 systemd[1523]: Reached target default.target. Sep 13 00:53:14.919651 systemd[1]: Started session-2.scope. Sep 13 00:53:14.919688 systemd[1523]: Startup finished in 139ms. Sep 13 00:53:17.095701 waagent[1514]: 2025-09-13T00:53:17.095596Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 00:53:17.105040 waagent[1514]: 2025-09-13T00:53:17.104963Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 00:53:17.107444 waagent[1514]: 2025-09-13T00:53:17.107390Z INFO Daemon Daemon Python: 3.9.16 Sep 13 00:53:17.109988 waagent[1514]: 2025-09-13T00:53:17.109923Z INFO Daemon Daemon Run daemon Sep 13 00:53:17.112619 waagent[1514]: 2025-09-13T00:53:17.112352Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 00:53:17.127361 waagent[1514]: 2025-09-13T00:53:17.127258Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:53:17.134279 waagent[1514]: 2025-09-13T00:53:17.134176Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.135774Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.136544Z INFO Daemon Daemon Using waagent for provisioning Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.137991Z INFO Daemon Daemon Activate resource disk Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.138891Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.147475Z INFO Daemon Daemon Found device: None Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.148144Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.149035Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.151011Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.151996Z INFO Daemon Daemon Running default provisioning handler Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.161446Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.164260Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.165511Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:53:17.179865 waagent[1514]: 2025-09-13T00:53:17.166530Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 00:53:17.217789 waagent[1514]: 2025-09-13T00:53:17.217629Z INFO Daemon Daemon Successfully mounted dvd Sep 13 00:53:17.248898 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 00:53:17.311431 waagent[1514]: 2025-09-13T00:53:17.311297Z INFO Daemon Daemon Detect protocol endpoint Sep 13 00:53:17.325888 waagent[1514]: 2025-09-13T00:53:17.312574Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:53:17.325888 waagent[1514]: 2025-09-13T00:53:17.313647Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 00:53:17.325888 waagent[1514]: 2025-09-13T00:53:17.314452Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 00:53:17.325888 waagent[1514]: 2025-09-13T00:53:17.315562Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 00:53:17.325888 waagent[1514]: 2025-09-13T00:53:17.316283Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 00:53:17.352118 waagent[1514]: 2025-09-13T00:53:17.351996Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 00:53:17.355870 waagent[1514]: 2025-09-13T00:53:17.355826Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 00:53:17.358661 waagent[1514]: 2025-09-13T00:53:17.358609Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 00:53:17.736174 waagent[1514]: 2025-09-13T00:53:17.735974Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 00:53:17.744854 waagent[1514]: 2025-09-13T00:53:17.744787Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 00:53:17.749966 waagent[1514]: 2025-09-13T00:53:17.745944Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 00:53:17.804407 waagent[1514]: 2025-09-13T00:53:17.804295Z INFO Daemon Daemon Found private key matching thumbprint 5B5FF2756E2563106C1B57E12EB541AB7D0172E8 Sep 13 00:53:17.808627 waagent[1514]: 2025-09-13T00:53:17.808565Z INFO Daemon Daemon Fetch goal state completed Sep 13 00:53:17.828508 waagent[1514]: 2025-09-13T00:53:17.828454Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 50af4bf2-be1f-40a6-8f99-e739282f5f4d New eTag: 2894751951340127447] Sep 13 00:53:17.833983 waagent[1514]: 2025-09-13T00:53:17.833921Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:53:17.844520 waagent[1514]: 2025-09-13T00:53:17.844458Z INFO Daemon Daemon Starting provisioning Sep 13 00:53:17.847439 waagent[1514]: 2025-09-13T00:53:17.847382Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 00:53:17.850084 waagent[1514]: 2025-09-13T00:53:17.850034Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-ad8a68f24a] Sep 13 00:53:17.859140 waagent[1514]: 2025-09-13T00:53:17.859027Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-ad8a68f24a] Sep 13 00:53:17.862738 waagent[1514]: 2025-09-13T00:53:17.862672Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 00:53:17.866324 waagent[1514]: 2025-09-13T00:53:17.866267Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 00:53:17.878535 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 00:53:17.878775 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 00:53:17.878843 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 00:53:17.879186 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:53:17.885205 systemd-networkd[1170]: eth0: DHCPv6 lease lost Sep 13 00:53:17.886408 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:53:17.886565 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:53:17.889023 systemd[1]: Starting systemd-networkd.service... Sep 13 00:53:17.918882 systemd-networkd[1564]: enP43062s1: Link UP Sep 13 00:53:17.918893 systemd-networkd[1564]: enP43062s1: Gained carrier Sep 13 00:53:17.928476 waagent[1514]: 2025-09-13T00:53:17.922554Z INFO Daemon Daemon Create user account if not exists Sep 13 00:53:17.928476 waagent[1514]: 2025-09-13T00:53:17.924070Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 00:53:17.928476 waagent[1514]: 2025-09-13T00:53:17.924925Z INFO Daemon Daemon Configure sudoer Sep 13 00:53:17.920322 systemd-networkd[1564]: eth0: Link UP Sep 13 00:53:17.920327 systemd-networkd[1564]: eth0: Gained carrier Sep 13 00:53:17.920755 systemd-networkd[1564]: lo: Link UP Sep 13 00:53:17.920758 systemd-networkd[1564]: lo: Gained carrier Sep 13 00:53:17.921005 systemd-networkd[1564]: eth0: Gained IPv6LL Sep 13 00:53:17.921243 systemd-networkd[1564]: Enumeration completed Sep 13 00:53:17.921331 systemd[1]: Started systemd-networkd.service. Sep 13 00:53:17.929906 waagent[1514]: 2025-09-13T00:53:17.929838Z INFO Daemon Daemon Configure sshd Sep 13 00:53:17.931912 waagent[1514]: 2025-09-13T00:53:17.931839Z INFO Daemon Daemon Deploy ssh public key. Sep 13 00:53:17.933508 systemd-networkd[1564]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:53:17.936591 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:53:17.949192 systemd-networkd[1564]: eth0: DHCPv4 address 10.200.4.19/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:53:17.952215 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:53:19.048787 waagent[1514]: 2025-09-13T00:53:19.048718Z INFO Daemon Daemon Provisioning complete Sep 13 00:53:19.059868 waagent[1514]: 2025-09-13T00:53:19.059798Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 00:53:19.067805 waagent[1514]: 2025-09-13T00:53:19.061187Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 00:53:19.067805 waagent[1514]: 2025-09-13T00:53:19.063013Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 00:53:19.332124 waagent[1570]: 2025-09-13T00:53:19.332027Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 00:53:19.332917 waagent[1570]: 2025-09-13T00:53:19.332855Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:53:19.333055 waagent[1570]: 2025-09-13T00:53:19.333009Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:53:19.344348 waagent[1570]: 2025-09-13T00:53:19.344271Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 00:53:19.344516 waagent[1570]: 2025-09-13T00:53:19.344467Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 00:53:19.390826 waagent[1570]: 2025-09-13T00:53:19.390705Z INFO ExtHandler ExtHandler Found private key matching thumbprint 5B5FF2756E2563106C1B57E12EB541AB7D0172E8 Sep 13 00:53:19.391105 waagent[1570]: 2025-09-13T00:53:19.391051Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 00:53:19.402650 waagent[1570]: 2025-09-13T00:53:19.402592Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 219dd8d1-70b3-4215-bc87-3587457bfdc1 New eTag: 2894751951340127447] Sep 13 00:53:19.403192 waagent[1570]: 2025-09-13T00:53:19.403123Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:53:19.442877 waagent[1570]: 2025-09-13T00:53:19.442743Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:53:19.455383 waagent[1570]: 2025-09-13T00:53:19.455300Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1570 Sep 13 00:53:19.460220 waagent[1570]: 2025-09-13T00:53:19.460150Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:53:19.461877 waagent[1570]: 2025-09-13T00:53:19.461812Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 00:53:19.497612 waagent[1570]: 2025-09-13T00:53:19.497554Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:53:19.497992 waagent[1570]: 2025-09-13T00:53:19.497936Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:53:19.505422 waagent[1570]: 2025-09-13T00:53:19.505369Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:53:19.505881 waagent[1570]: 2025-09-13T00:53:19.505826Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:53:19.506896 waagent[1570]: 2025-09-13T00:53:19.506831Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 00:53:19.508111 waagent[1570]: 2025-09-13T00:53:19.508053Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:53:19.508491 waagent[1570]: 2025-09-13T00:53:19.508440Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:53:19.508811 waagent[1570]: 2025-09-13T00:53:19.508760Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:53:19.509330 waagent[1570]: 2025-09-13T00:53:19.509282Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:53:19.509595 waagent[1570]: 2025-09-13T00:53:19.509543Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:53:19.509595 waagent[1570]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:53:19.509595 waagent[1570]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:53:19.509595 waagent[1570]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:53:19.509595 waagent[1570]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:53:19.509595 waagent[1570]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:53:19.509595 waagent[1570]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:53:19.512210 waagent[1570]: 2025-09-13T00:53:19.512012Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:53:19.512444 waagent[1570]: 2025-09-13T00:53:19.512380Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:53:19.512829 waagent[1570]: 2025-09-13T00:53:19.512779Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:53:19.513623 waagent[1570]: 2025-09-13T00:53:19.513569Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:53:19.514419 waagent[1570]: 2025-09-13T00:53:19.514362Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:53:19.514555 waagent[1570]: 2025-09-13T00:53:19.514512Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:53:19.515227 waagent[1570]: 2025-09-13T00:53:19.515180Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:53:19.515388 waagent[1570]: 2025-09-13T00:53:19.515340Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:53:19.515845 waagent[1570]: 2025-09-13T00:53:19.515791Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:53:19.515998 waagent[1570]: 2025-09-13T00:53:19.515949Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:53:19.516113 waagent[1570]: 2025-09-13T00:53:19.516070Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:53:19.532366 waagent[1570]: 2025-09-13T00:53:19.530203Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 00:53:19.532366 waagent[1570]: 2025-09-13T00:53:19.530985Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:53:19.532366 waagent[1570]: 2025-09-13T00:53:19.532098Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 00:53:19.537330 waagent[1570]: 2025-09-13T00:53:19.537265Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1564' Sep 13 00:53:19.558207 waagent[1570]: 2025-09-13T00:53:19.558057Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:53:19.558207 waagent[1570]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:53:19.558207 waagent[1570]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:53:19.558207 waagent[1570]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:79:7a:95 brd ff:ff:ff:ff:ff:ff Sep 13 00:53:19.558207 waagent[1570]: 3: enP43062s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:79:7a:95 brd ff:ff:ff:ff:ff:ff\ altname enP43062p0s2 Sep 13 00:53:19.558207 waagent[1570]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:53:19.558207 waagent[1570]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:53:19.558207 waagent[1570]: 2: eth0 inet 10.200.4.19/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:53:19.558207 waagent[1570]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:53:19.558207 waagent[1570]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:53:19.558207 waagent[1570]: 2: eth0 inet6 fe80::7e1e:52ff:fe79:7a95/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:53:19.559703 waagent[1570]: 2025-09-13T00:53:19.559662Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 00:53:19.757096 waagent[1570]: 2025-09-13T00:53:19.756948Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Sep 13 00:53:19.761442 waagent[1570]: 2025-09-13T00:53:19.761316Z INFO EnvHandler ExtHandler Firewall rules: Sep 13 00:53:19.761442 waagent[1570]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:19.761442 waagent[1570]: pkts bytes target prot opt in out source destination Sep 13 00:53:19.761442 waagent[1570]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:19.761442 waagent[1570]: pkts bytes target prot opt in out source destination Sep 13 00:53:19.761442 waagent[1570]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:19.761442 waagent[1570]: pkts bytes target prot opt in out source destination Sep 13 00:53:19.761442 waagent[1570]: 24 1248 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:53:19.761442 waagent[1570]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:53:19.764362 waagent[1570]: 2025-09-13T00:53:19.764300Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 00:53:19.777349 waagent[1570]: 2025-09-13T00:53:19.777288Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 00:53:20.066864 waagent[1514]: 2025-09-13T00:53:20.066673Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 00:53:20.071753 waagent[1514]: 2025-09-13T00:53:20.071690Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 00:53:21.150749 waagent[1607]: 2025-09-13T00:53:21.150646Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 00:53:21.151475 waagent[1607]: 2025-09-13T00:53:21.151407Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 00:53:21.151633 waagent[1607]: 2025-09-13T00:53:21.151583Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 00:53:21.151779 waagent[1607]: 2025-09-13T00:53:21.151734Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Sep 13 00:53:21.166313 waagent[1607]: 2025-09-13T00:53:21.166210Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:53:21.166714 waagent[1607]: 2025-09-13T00:53:21.166656Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:53:21.166883 waagent[1607]: 2025-09-13T00:53:21.166836Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:53:21.167105 waagent[1607]: 2025-09-13T00:53:21.167058Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 00:53:21.178218 waagent[1607]: 2025-09-13T00:53:21.178147Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 00:53:21.185539 waagent[1607]: 2025-09-13T00:53:21.185479Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.177 Sep 13 00:53:21.186422 waagent[1607]: 2025-09-13T00:53:21.186365Z INFO ExtHandler Sep 13 00:53:21.186588 waagent[1607]: 2025-09-13T00:53:21.186540Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: ca17117d-4973-4daf-b0b3-e331e5aba295 eTag: 2894751951340127447 source: Fabric] Sep 13 00:53:21.187292 waagent[1607]: 2025-09-13T00:53:21.187238Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 00:53:21.188390 waagent[1607]: 2025-09-13T00:53:21.188329Z INFO ExtHandler Sep 13 00:53:21.188548 waagent[1607]: 2025-09-13T00:53:21.188499Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 00:53:21.193888 waagent[1607]: 2025-09-13T00:53:21.193836Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 00:53:21.194375 waagent[1607]: 2025-09-13T00:53:21.194327Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:53:21.209430 waagent[1607]: 2025-09-13T00:53:21.209376Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 00:53:21.258375 waagent[1607]: 2025-09-13T00:53:21.258255Z INFO ExtHandler Downloaded certificate {'thumbprint': '5B5FF2756E2563106C1B57E12EB541AB7D0172E8', 'hasPrivateKey': True} Sep 13 00:53:21.259600 waagent[1607]: 2025-09-13T00:53:21.259537Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 00:53:21.260421 waagent[1607]: 2025-09-13T00:53:21.260364Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 00:53:21.274556 waagent[1607]: 2025-09-13T00:53:21.274456Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 00:53:21.281873 waagent[1607]: 2025-09-13T00:53:21.281780Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:53:21.285366 waagent[1607]: 2025-09-13T00:53:21.285268Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 00:53:21.285596 waagent[1607]: 2025-09-13T00:53:21.285544Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 00:53:21.299891 waagent[1607]: 2025-09-13T00:53:21.299786Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: Sep 13 00:53:21.299891 waagent[1607]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.299891 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.299891 waagent[1607]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.299891 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.299891 waagent[1607]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.299891 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.299891 waagent[1607]: 79 9103 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:53:21.299891 waagent[1607]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:53:21.300981 waagent[1607]: 2025-09-13T00:53:21.300910Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 00:53:21.303509 waagent[1607]: 2025-09-13T00:53:21.303409Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 00:53:21.303785 waagent[1607]: 2025-09-13T00:53:21.303733Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:53:21.304126 waagent[1607]: 2025-09-13T00:53:21.304072Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:53:21.311464 waagent[1607]: 2025-09-13T00:53:21.311409Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:53:21.311935 waagent[1607]: 2025-09-13T00:53:21.311880Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:53:21.319342 waagent[1607]: 2025-09-13T00:53:21.319276Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1607 Sep 13 00:53:21.322274 waagent[1607]: 2025-09-13T00:53:21.322210Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:53:21.322983 waagent[1607]: 2025-09-13T00:53:21.322924Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 00:53:21.323792 waagent[1607]: 2025-09-13T00:53:21.323734Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 00:53:21.326237 waagent[1607]: 2025-09-13T00:53:21.326179Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 00:53:21.326556 waagent[1607]: 2025-09-13T00:53:21.326506Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 00:53:21.327801 waagent[1607]: 2025-09-13T00:53:21.327746Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:53:21.328221 waagent[1607]: 2025-09-13T00:53:21.328164Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:53:21.328404 waagent[1607]: 2025-09-13T00:53:21.328359Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:53:21.329286 waagent[1607]: 2025-09-13T00:53:21.329236Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:53:21.329496 waagent[1607]: 2025-09-13T00:53:21.329422Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:53:21.330194 waagent[1607]: 2025-09-13T00:53:21.330123Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:53:21.330314 waagent[1607]: 2025-09-13T00:53:21.330261Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:53:21.330579 waagent[1607]: 2025-09-13T00:53:21.330533Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:53:21.331003 waagent[1607]: 2025-09-13T00:53:21.330956Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:53:21.331247 waagent[1607]: 2025-09-13T00:53:21.331200Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:53:21.331503 waagent[1607]: 2025-09-13T00:53:21.331453Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:53:21.331503 waagent[1607]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:53:21.331503 waagent[1607]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:53:21.331503 waagent[1607]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:53:21.331503 waagent[1607]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:53:21.331503 waagent[1607]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:53:21.331503 waagent[1607]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:53:21.334035 waagent[1607]: 2025-09-13T00:53:21.333968Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:53:21.335162 waagent[1607]: 2025-09-13T00:53:21.333800Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:53:21.341577 waagent[1607]: 2025-09-13T00:53:21.341503Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:53:21.341670 waagent[1607]: 2025-09-13T00:53:21.341289Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:53:21.348445 waagent[1607]: 2025-09-13T00:53:21.348377Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:53:21.350561 waagent[1607]: 2025-09-13T00:53:21.350495Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:53:21.350561 waagent[1607]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:53:21.350561 waagent[1607]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:53:21.350561 waagent[1607]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:79:7a:95 brd ff:ff:ff:ff:ff:ff Sep 13 00:53:21.350561 waagent[1607]: 3: enP43062s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:79:7a:95 brd ff:ff:ff:ff:ff:ff\ altname enP43062p0s2 Sep 13 00:53:21.350561 waagent[1607]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:53:21.350561 waagent[1607]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:53:21.350561 waagent[1607]: 2: eth0 inet 10.200.4.19/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:53:21.350561 waagent[1607]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:53:21.350561 waagent[1607]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:53:21.350561 waagent[1607]: 2: eth0 inet6 fe80::7e1e:52ff:fe79:7a95/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:53:21.366147 waagent[1607]: 2025-09-13T00:53:21.365908Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 00:53:21.370516 waagent[1607]: 2025-09-13T00:53:21.370461Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:53:21.390498 waagent[1607]: 2025-09-13T00:53:21.390429Z INFO ExtHandler ExtHandler Sep 13 00:53:21.390727 waagent[1607]: 2025-09-13T00:53:21.390659Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d9b13c4a-2bfb-4385-a82e-8b3736bce8e1 correlation 05c91745-a660-40cc-a95e-0874eb27239e created: 2025-09-13T00:52:39.678963Z] Sep 13 00:53:21.398389 waagent[1607]: 2025-09-13T00:53:21.398323Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: Sep 13 00:53:21.398389 waagent[1607]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.398389 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.398389 waagent[1607]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.398389 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.398389 waagent[1607]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.398389 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.398389 waagent[1607]: 106 12498 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:53:21.398389 waagent[1607]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:53:21.416558 waagent[1607]: 2025-09-13T00:53:21.416457Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 00:53:21.421182 waagent[1607]: 2025-09-13T00:53:21.421108Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 30 ms] Sep 13 00:53:21.464340 waagent[1607]: 2025-09-13T00:53:21.464233Z INFO EnvHandler ExtHandler The firewall was setup successfully: Sep 13 00:53:21.464340 waagent[1607]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.464340 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.464340 waagent[1607]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.464340 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.464340 waagent[1607]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:53:21.464340 waagent[1607]: pkts bytes target prot opt in out source destination Sep 13 00:53:21.464340 waagent[1607]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 00:53:21.464340 waagent[1607]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:53:21.464340 waagent[1607]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:53:22.486701 waagent[1607]: 2025-09-13T00:53:22.486630Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 00:53:22.489192 waagent[1607]: 2025-09-13T00:53:22.489110Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: C720C23D-4F6E-4162-AC4E-A56965EF4205;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 00:53:24.818565 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:53:24.818805 systemd[1]: Stopped kubelet.service. Sep 13 00:53:24.818854 systemd[1]: kubelet.service: Consumed 1.192s CPU time. Sep 13 00:53:24.820356 systemd[1]: Starting kubelet.service... Sep 13 00:53:24.911967 systemd[1]: Started kubelet.service. Sep 13 00:53:25.617998 kubelet[1657]: E0913 00:53:25.617943 1657 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:53:25.620861 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:53:25.621022 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:53:26.409469 systemd[1]: Created slice system-sshd.slice. Sep 13 00:53:26.411151 systemd[1]: Started sshd@0-10.200.4.19:22-10.200.16.10:34900.service. Sep 13 00:53:27.052902 sshd[1663]: Accepted publickey for core from 10.200.16.10 port 34900 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:27.054213 sshd[1663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:27.058703 systemd[1]: Started session-3.scope. Sep 13 00:53:27.059125 systemd-logind[1399]: New session 3 of user core. Sep 13 00:53:27.573217 systemd[1]: Started sshd@1-10.200.4.19:22-10.200.16.10:34904.service. Sep 13 00:53:28.167886 sshd[1668]: Accepted publickey for core from 10.200.16.10 port 34904 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:28.170029 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:28.173999 systemd-logind[1399]: New session 4 of user core. Sep 13 00:53:28.174597 systemd[1]: Started session-4.scope. Sep 13 00:53:28.596849 sshd[1668]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:28.599345 systemd[1]: sshd@1-10.200.4.19:22-10.200.16.10:34904.service: Deactivated successfully. Sep 13 00:53:28.600154 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:53:28.600756 systemd-logind[1399]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:53:28.601483 systemd-logind[1399]: Removed session 4. Sep 13 00:53:28.695326 systemd[1]: Started sshd@2-10.200.4.19:22-10.200.16.10:34914.service. Sep 13 00:53:29.290212 sshd[1674]: Accepted publickey for core from 10.200.16.10 port 34914 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:29.291480 sshd[1674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:29.295941 systemd[1]: Started session-5.scope. Sep 13 00:53:29.296487 systemd-logind[1399]: New session 5 of user core. Sep 13 00:53:29.711569 sshd[1674]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:29.714066 systemd[1]: sshd@2-10.200.4.19:22-10.200.16.10:34914.service: Deactivated successfully. Sep 13 00:53:29.714830 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:53:29.715392 systemd-logind[1399]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:53:29.716058 systemd-logind[1399]: Removed session 5. Sep 13 00:53:29.814848 systemd[1]: Started sshd@3-10.200.4.19:22-10.200.16.10:34922.service. Sep 13 00:53:30.409639 sshd[1680]: Accepted publickey for core from 10.200.16.10 port 34922 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:30.410884 sshd[1680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:30.415216 systemd-logind[1399]: New session 6 of user core. Sep 13 00:53:30.415283 systemd[1]: Started session-6.scope. Sep 13 00:53:30.838768 sshd[1680]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:30.841239 systemd[1]: sshd@3-10.200.4.19:22-10.200.16.10:34922.service: Deactivated successfully. Sep 13 00:53:30.841997 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:53:30.842559 systemd-logind[1399]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:53:30.843259 systemd-logind[1399]: Removed session 6. Sep 13 00:53:30.936323 systemd[1]: Started sshd@4-10.200.4.19:22-10.200.16.10:57704.service. Sep 13 00:53:31.525432 sshd[1686]: Accepted publickey for core from 10.200.16.10 port 57704 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:31.526705 sshd[1686]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:31.531122 systemd[1]: Started session-7.scope. Sep 13 00:53:31.531707 systemd-logind[1399]: New session 7 of user core. Sep 13 00:53:31.918755 sudo[1689]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:53:31.919050 sudo[1689]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:53:31.932315 dbus-daemon[1389]: н9\x8exU: received setenforce notice (enforcing=626787520) Sep 13 00:53:31.934004 sudo[1689]: pam_unix(sudo:session): session closed for user root Sep 13 00:53:32.040797 sshd[1686]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:32.043610 systemd[1]: sshd@4-10.200.4.19:22-10.200.16.10:57704.service: Deactivated successfully. Sep 13 00:53:32.044425 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:53:32.044988 systemd-logind[1399]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:53:32.045750 systemd-logind[1399]: Removed session 7. Sep 13 00:53:32.138177 systemd[1]: Started sshd@5-10.200.4.19:22-10.200.16.10:57708.service. Sep 13 00:53:32.727625 sshd[1693]: Accepted publickey for core from 10.200.16.10 port 57708 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:32.728932 sshd[1693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:32.733396 systemd[1]: Started session-8.scope. Sep 13 00:53:32.733935 systemd-logind[1399]: New session 8 of user core. Sep 13 00:53:33.051748 sudo[1697]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:53:33.052239 sudo[1697]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:53:33.054849 sudo[1697]: pam_unix(sudo:session): session closed for user root Sep 13 00:53:33.059202 sudo[1696]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:53:33.059487 sudo[1696]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:53:33.067808 systemd[1]: Stopping audit-rules.service... Sep 13 00:53:33.072785 kernel: kauditd_printk_skb: 136 callbacks suppressed Sep 13 00:53:33.072891 kernel: audit: type=1305 audit(1757724813.067:216): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:53:33.067000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:53:33.073172 auditctl[1700]: No rules Sep 13 00:53:33.073764 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:53:33.073934 systemd[1]: Stopped audit-rules.service. Sep 13 00:53:33.075575 systemd[1]: Starting audit-rules.service... Sep 13 00:53:33.067000 audit[1700]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe1d278c40 a2=420 a3=0 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:33.097083 kernel: audit: type=1300 audit(1757724813.067:216): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe1d278c40 a2=420 a3=0 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:33.097197 kernel: audit: type=1327 audit(1757724813.067:216): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:53:33.067000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:53:33.100012 augenrules[1717]: No rules Sep 13 00:53:33.101108 systemd[1]: Finished audit-rules.service. Sep 13 00:53:33.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.103752 sudo[1696]: pam_unix(sudo:session): session closed for user root Sep 13 00:53:33.123723 kernel: audit: type=1131 audit(1757724813.072:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.123829 kernel: audit: type=1130 audit(1757724813.100:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.123853 kernel: audit: type=1106 audit(1757724813.101:219): pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.101000 audit[1696]: USER_END pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.101000 audit[1696]: CRED_DISP pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.135164 kernel: audit: type=1104 audit(1757724813.101:220): pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.201147 sshd[1693]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:33.201000 audit[1693]: USER_END pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:33.204023 systemd[1]: sshd@5-10.200.4.19:22-10.200.16.10:57708.service: Deactivated successfully. Sep 13 00:53:33.204746 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:53:33.206083 systemd-logind[1399]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:53:33.207039 systemd-logind[1399]: Removed session 8. Sep 13 00:53:33.201000 audit[1693]: CRED_DISP pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:33.230113 kernel: audit: type=1106 audit(1757724813.201:221): pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:33.230212 kernel: audit: type=1104 audit(1757724813.201:222): pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:33.230284 kernel: audit: type=1131 audit(1757724813.201:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.19:22-10.200.16.10:57708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.19:22-10.200.16.10:57708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.19:22-10.200.16.10:57716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:33.299355 systemd[1]: Started sshd@6-10.200.4.19:22-10.200.16.10:57716.service. Sep 13 00:53:33.892000 audit[1723]: USER_ACCT pid=1723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:33.893494 sshd[1723]: Accepted publickey for core from 10.200.16.10 port 57716 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:53:33.893000 audit[1723]: CRED_ACQ pid=1723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:33.893000 audit[1723]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8dc77ce0 a2=3 a3=0 items=0 ppid=1 pid=1723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:33.893000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:53:33.894714 sshd[1723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:53:33.899099 systemd[1]: Started session-9.scope. Sep 13 00:53:33.899647 systemd-logind[1399]: New session 9 of user core. Sep 13 00:53:33.902000 audit[1723]: USER_START pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:33.904000 audit[1725]: CRED_ACQ pid=1725 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:34.219000 audit[1726]: USER_ACCT pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:34.219000 audit[1726]: CRED_REFR pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:34.220345 sudo[1726]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:53:34.220664 sudo[1726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:53:34.221000 audit[1726]: USER_START pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:34.236565 systemd[1]: Starting coreos-metadata.service... Sep 13 00:53:34.278507 coreos-metadata[1730]: Sep 13 00:53:34.278 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 00:53:34.280977 coreos-metadata[1730]: Sep 13 00:53:34.280 INFO Fetch successful Sep 13 00:53:34.281238 coreos-metadata[1730]: Sep 13 00:53:34.281 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 13 00:53:34.282444 coreos-metadata[1730]: Sep 13 00:53:34.282 INFO Fetch successful Sep 13 00:53:34.282790 coreos-metadata[1730]: Sep 13 00:53:34.282 INFO Fetching http://168.63.129.16/machine/0c824539-8141-47ae-aa25-843950909431/397aac98%2D5a28%2D4511%2Db579%2D94fbb8ba9c0d.%5Fci%2D3510.3.8%2Dn%2Dad8a68f24a?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 13 00:53:34.284082 coreos-metadata[1730]: Sep 13 00:53:34.284 INFO Fetch successful Sep 13 00:53:34.314386 coreos-metadata[1730]: Sep 13 00:53:34.314 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 13 00:53:34.321805 coreos-metadata[1730]: Sep 13 00:53:34.321 INFO Fetch successful Sep 13 00:53:34.329716 systemd[1]: Finished coreos-metadata.service. Sep 13 00:53:34.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:34.869069 systemd[1]: Stopped kubelet.service. Sep 13 00:53:34.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:34.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:34.871576 systemd[1]: Starting kubelet.service... Sep 13 00:53:34.905657 systemd[1]: Reloading. Sep 13 00:53:35.029955 /usr/lib/systemd/system-generators/torcx-generator[1786]: time="2025-09-13T00:53:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:53:35.030085 /usr/lib/systemd/system-generators/torcx-generator[1786]: time="2025-09-13T00:53:35Z" level=info msg="torcx already run" Sep 13 00:53:35.106436 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:53:35.106460 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:53:35.121298 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit: BPF prog-id=47 op=LOAD Sep 13 00:53:35.183000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit: BPF prog-id=48 op=LOAD Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.183000 audit: BPF prog-id=49 op=LOAD Sep 13 00:53:35.183000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:53:35.183000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.184000 audit: BPF prog-id=50 op=LOAD Sep 13 00:53:35.184000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit: BPF prog-id=51 op=LOAD Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.185000 audit: BPF prog-id=52 op=LOAD Sep 13 00:53:35.185000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:53:35.185000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit: BPF prog-id=53 op=LOAD Sep 13 00:53:35.188000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit: BPF prog-id=54 op=LOAD Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.188000 audit: BPF prog-id=55 op=LOAD Sep 13 00:53:35.188000 audit: BPF prog-id=42 op=UNLOAD Sep 13 00:53:35.188000 audit: BPF prog-id=43 op=UNLOAD Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.189000 audit: BPF prog-id=56 op=LOAD Sep 13 00:53:35.189000 audit: BPF prog-id=39 op=UNLOAD Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit: BPF prog-id=57 op=LOAD Sep 13 00:53:35.191000 audit: BPF prog-id=46 op=UNLOAD Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.192000 audit: BPF prog-id=58 op=LOAD Sep 13 00:53:35.192000 audit: BPF prog-id=44 op=UNLOAD Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit: BPF prog-id=59 op=LOAD Sep 13 00:53:35.194000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit: BPF prog-id=60 op=LOAD Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:35.194000 audit: BPF prog-id=61 op=LOAD Sep 13 00:53:35.194000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:53:35.194000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:53:35.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:35.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:35.214084 systemd[1]: Stopping kubelet.service... Sep 13 00:53:35.214444 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:53:35.214676 systemd[1]: Stopped kubelet.service. Sep 13 00:53:35.216341 systemd[1]: Starting kubelet.service... Sep 13 00:53:35.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:35.656638 systemd[1]: Started kubelet.service. Sep 13 00:53:36.476584 kubelet[1853]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:53:36.476898 kubelet[1853]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 13 00:53:36.476898 kubelet[1853]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:53:36.477076 kubelet[1853]: I0913 00:53:36.477034 1853 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:53:36.864557 kubelet[1853]: I0913 00:53:36.864520 1853 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 13 00:53:36.864557 kubelet[1853]: I0913 00:53:36.864547 1853 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:53:36.864829 kubelet[1853]: I0913 00:53:36.864811 1853 server.go:934] "Client rotation is on, will bootstrap in background" Sep 13 00:53:36.883221 kubelet[1853]: I0913 00:53:36.883191 1853 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:53:36.897958 kubelet[1853]: E0913 00:53:36.897919 1853 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:53:36.897958 kubelet[1853]: I0913 00:53:36.897953 1853 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:53:36.902715 kubelet[1853]: I0913 00:53:36.902694 1853 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:53:36.903585 kubelet[1853]: I0913 00:53:36.903559 1853 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 13 00:53:36.903754 kubelet[1853]: I0913 00:53:36.903714 1853 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:53:36.903988 kubelet[1853]: I0913 00:53:36.903758 1853 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.4.19","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:53:36.904168 kubelet[1853]: I0913 00:53:36.904000 1853 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:53:36.904168 kubelet[1853]: I0913 00:53:36.904013 1853 container_manager_linux.go:300] "Creating device plugin manager" Sep 13 00:53:36.904168 kubelet[1853]: I0913 00:53:36.904125 1853 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:53:36.910880 kubelet[1853]: I0913 00:53:36.910861 1853 kubelet.go:408] "Attempting to sync node with API server" Sep 13 00:53:36.911037 kubelet[1853]: I0913 00:53:36.911025 1853 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:53:36.911147 kubelet[1853]: I0913 00:53:36.911119 1853 kubelet.go:314] "Adding apiserver pod source" Sep 13 00:53:36.911222 kubelet[1853]: I0913 00:53:36.911214 1853 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:53:36.911410 kubelet[1853]: E0913 00:53:36.911345 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:36.911410 kubelet[1853]: E0913 00:53:36.911385 1853 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:36.918983 kubelet[1853]: I0913 00:53:36.918962 1853 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:53:36.919436 kubelet[1853]: I0913 00:53:36.919420 1853 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:53:36.919521 kubelet[1853]: W0913 00:53:36.919479 1853 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:53:36.926751 kubelet[1853]: I0913 00:53:36.926725 1853 server.go:1274] "Started kubelet" Sep 13 00:53:36.928869 kubelet[1853]: I0913 00:53:36.928828 1853 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:53:36.930040 kubelet[1853]: I0913 00:53:36.930022 1853 server.go:449] "Adding debug handlers to kubelet server" Sep 13 00:53:36.932522 kubelet[1853]: I0913 00:53:36.932485 1853 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:53:36.932643 kubelet[1853]: I0913 00:53:36.932626 1853 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 13 00:53:36.932758 kubelet[1853]: I0913 00:53:36.932750 1853 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:53:36.931000 audit[1853]: AVC avc: denied { mac_admin } for pid=1853 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:36.931000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:53:36.931000 audit[1853]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000820c60 a1=c00055ac30 a2=c000820c30 a3=25 items=0 ppid=1 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.931000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:53:36.931000 audit[1853]: AVC avc: denied { mac_admin } for pid=1853 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:36.931000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:53:36.931000 audit[1853]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000806520 a1=c00055ac48 a2=c000820cf0 a3=25 items=0 ppid=1 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.931000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:53:36.933982 kubelet[1853]: I0913 00:53:36.933942 1853 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:53:36.934249 kubelet[1853]: I0913 00:53:36.934234 1853 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:53:36.935000 audit[1865]: NETFILTER_CFG table=mangle:9 family=2 entries=2 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.935000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce4f4dae0 a2=0 a3=7ffce4f4dacc items=0 ppid=1853 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:53:36.936000 audit[1866]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.936000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd059ae0f0 a2=0 a3=7ffd059ae0dc items=0 ppid=1853 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:53:36.939524 kubelet[1853]: I0913 00:53:36.939494 1853 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:53:36.941282 kubelet[1853]: I0913 00:53:36.941096 1853 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 13 00:53:36.941420 kubelet[1853]: E0913 00:53:36.941384 1853 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.4.19\" not found" Sep 13 00:53:36.941000 audit[1868]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.941000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff16c71520 a2=0 a3=7fff16c7150c items=0 ppid=1853 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:53:36.944280 kubelet[1853]: I0913 00:53:36.944265 1853 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:53:36.944515 kubelet[1853]: I0913 00:53:36.944495 1853 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:53:36.945412 kubelet[1853]: I0913 00:53:36.945398 1853 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 13 00:53:36.945495 kubelet[1853]: I0913 00:53:36.945456 1853 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:53:36.946689 kubelet[1853]: I0913 00:53:36.946675 1853 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:53:36.946000 audit[1870]: NETFILTER_CFG table=filter:12 family=2 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.946000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3893faf0 a2=0 a3=7ffd3893fadc items=0 ppid=1853 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:53:36.960000 audit[1873]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.960000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc4400d4f0 a2=0 a3=7ffc4400d4dc items=0 ppid=1853 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:53:36.961571 kubelet[1853]: I0913 00:53:36.961424 1853 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:53:36.961000 audit[1874]: NETFILTER_CFG table=mangle:14 family=10 entries=2 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:36.961000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd12d7eed0 a2=0 a3=7ffd12d7eebc items=0 ppid=1853 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:53:36.962731 kubelet[1853]: I0913 00:53:36.962676 1853 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:53:36.962731 kubelet[1853]: I0913 00:53:36.962696 1853 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 13 00:53:36.962731 kubelet[1853]: I0913 00:53:36.962715 1853 kubelet.go:2321] "Starting kubelet main sync loop" Sep 13 00:53:36.962836 kubelet[1853]: E0913 00:53:36.962804 1853 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:53:36.962000 audit[1875]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.962000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb07d6b20 a2=0 a3=7ffeb07d6b0c items=0 ppid=1853 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:53:36.963000 audit[1877]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.963000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc27523b40 a2=0 a3=7ffc27523b2c items=0 ppid=1853 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:53:36.967933 kubelet[1853]: E0913 00:53:36.967918 1853 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.4.19\" not found" node="10.200.4.19" Sep 13 00:53:36.969000 audit[1881]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:36.969000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc72e91fc0 a2=0 a3=7ffc72e91fac items=0 ppid=1853 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:53:36.972849 kubelet[1853]: I0913 00:53:36.972784 1853 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 13 00:53:36.972849 kubelet[1853]: I0913 00:53:36.972799 1853 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 13 00:53:36.972849 kubelet[1853]: I0913 00:53:36.972816 1853 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:53:36.972000 audit[1880]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:36.972000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd740b4040 a2=0 a3=7ffd740b402c items=0 ppid=1853 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:53:36.973000 audit[1883]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:36.973000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc82ba3360 a2=0 a3=7ffc82ba334c items=0 ppid=1853 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:53:36.974000 audit[1884]: NETFILTER_CFG table=filter:20 family=10 entries=2 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:36.974000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff6a7d08c0 a2=0 a3=7fff6a7d08ac items=0 ppid=1853 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:36.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:53:36.981354 kubelet[1853]: I0913 00:53:36.981334 1853 policy_none.go:49] "None policy: Start" Sep 13 00:53:36.981760 kubelet[1853]: I0913 00:53:36.981743 1853 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 13 00:53:36.981760 kubelet[1853]: I0913 00:53:36.981763 1853 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:53:36.997697 systemd[1]: Created slice kubepods.slice. Sep 13 00:53:37.002223 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:53:37.004848 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:53:37.011000 audit[1853]: AVC avc: denied { mac_admin } for pid=1853 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:37.011000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:53:37.011000 audit[1853]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e0a750 a1=c00014f8a8 a2=c000e0a720 a3=25 items=0 ppid=1 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:37.011000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:53:37.013639 kubelet[1853]: I0913 00:53:37.012038 1853 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:53:37.013639 kubelet[1853]: I0913 00:53:37.012219 1853 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:53:37.013639 kubelet[1853]: I0913 00:53:37.012376 1853 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:53:37.013639 kubelet[1853]: I0913 00:53:37.012388 1853 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:53:37.014763 kubelet[1853]: I0913 00:53:37.014713 1853 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:53:37.015329 kubelet[1853]: E0913 00:53:37.015180 1853 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.4.19\" not found" Sep 13 00:53:37.116318 kubelet[1853]: I0913 00:53:37.114908 1853 kubelet_node_status.go:72] "Attempting to register node" node="10.200.4.19" Sep 13 00:53:37.119309 kubelet[1853]: I0913 00:53:37.119279 1853 kubelet_node_status.go:75] "Successfully registered node" node="10.200.4.19" Sep 13 00:53:37.119309 kubelet[1853]: E0913 00:53:37.119304 1853 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.200.4.19\": node \"10.200.4.19\" not found" Sep 13 00:53:37.147285 kubelet[1853]: I0913 00:53:37.147264 1853 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 00:53:37.147585 env[1412]: time="2025-09-13T00:53:37.147549883Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:53:37.147926 kubelet[1853]: I0913 00:53:37.147726 1853 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 00:53:37.198542 sudo[1726]: pam_unix(sudo:session): session closed for user root Sep 13 00:53:37.197000 audit[1726]: USER_END pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:37.197000 audit[1726]: CRED_DISP pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:53:37.303831 sshd[1723]: pam_unix(sshd:session): session closed for user core Sep 13 00:53:37.304000 audit[1723]: USER_END pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:37.304000 audit[1723]: CRED_DISP pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:53:37.306609 systemd[1]: sshd@6-10.200.4.19:22-10.200.16.10:57716.service: Deactivated successfully. Sep 13 00:53:37.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.19:22-10.200.16.10:57716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:37.307409 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:53:37.308172 systemd-logind[1399]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:53:37.308963 systemd-logind[1399]: Removed session 9. Sep 13 00:53:37.866926 kubelet[1853]: I0913 00:53:37.866900 1853 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 00:53:37.867361 kubelet[1853]: W0913 00:53:37.867076 1853 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:53:37.867361 kubelet[1853]: W0913 00:53:37.867172 1853 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:53:37.867361 kubelet[1853]: W0913 00:53:37.867204 1853 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:53:37.911842 kubelet[1853]: I0913 00:53:37.911810 1853 apiserver.go:52] "Watching apiserver" Sep 13 00:53:37.912183 kubelet[1853]: E0913 00:53:37.911841 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:37.916651 kubelet[1853]: E0913 00:53:37.916621 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:37.920907 systemd[1]: Created slice kubepods-besteffort-pod68481098_0844_42ed_bb67_add51c0f61a3.slice. Sep 13 00:53:37.930621 systemd[1]: Created slice kubepods-besteffort-pod498c01d9_f113_4159_ae58_d67dd8fdebb5.slice. Sep 13 00:53:37.946047 kubelet[1853]: I0913 00:53:37.946015 1853 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 13 00:53:37.950153 kubelet[1853]: I0913 00:53:37.950106 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b999x\" (UniqueName: \"kubernetes.io/projected/68481098-0844-42ed-bb67-add51c0f61a3-kube-api-access-b999x\") pod \"kube-proxy-dcjp2\" (UID: \"68481098-0844-42ed-bb67-add51c0f61a3\") " pod="kube-system/kube-proxy-dcjp2" Sep 13 00:53:37.950270 kubelet[1853]: I0913 00:53:37.950159 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-cni-log-dir\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950270 kubelet[1853]: I0913 00:53:37.950193 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-policysync\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950270 kubelet[1853]: I0913 00:53:37.950214 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/498c01d9-f113-4159-ae58-d67dd8fdebb5-tigera-ca-bundle\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950270 kubelet[1853]: I0913 00:53:37.950236 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-var-lib-calico\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950270 kubelet[1853]: I0913 00:53:37.950256 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/68481098-0844-42ed-bb67-add51c0f61a3-xtables-lock\") pod \"kube-proxy-dcjp2\" (UID: \"68481098-0844-42ed-bb67-add51c0f61a3\") " pod="kube-system/kube-proxy-dcjp2" Sep 13 00:53:37.950476 kubelet[1853]: I0913 00:53:37.950277 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/68481098-0844-42ed-bb67-add51c0f61a3-lib-modules\") pod \"kube-proxy-dcjp2\" (UID: \"68481098-0844-42ed-bb67-add51c0f61a3\") " pod="kube-system/kube-proxy-dcjp2" Sep 13 00:53:37.950476 kubelet[1853]: I0913 00:53:37.950305 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-lib-modules\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950476 kubelet[1853]: I0913 00:53:37.950341 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8df7239f-461c-4207-bddd-da329e7d0c91-registration-dir\") pod \"csi-node-driver-vfn6r\" (UID: \"8df7239f-461c-4207-bddd-da329e7d0c91\") " pod="calico-system/csi-node-driver-vfn6r" Sep 13 00:53:37.950476 kubelet[1853]: I0913 00:53:37.950368 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-cni-net-dir\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950476 kubelet[1853]: I0913 00:53:37.950395 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8df7239f-461c-4207-bddd-da329e7d0c91-socket-dir\") pod \"csi-node-driver-vfn6r\" (UID: \"8df7239f-461c-4207-bddd-da329e7d0c91\") " pod="calico-system/csi-node-driver-vfn6r" Sep 13 00:53:37.950704 kubelet[1853]: I0913 00:53:37.950432 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fj7fl\" (UniqueName: \"kubernetes.io/projected/498c01d9-f113-4159-ae58-d67dd8fdebb5-kube-api-access-fj7fl\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950704 kubelet[1853]: I0913 00:53:37.950457 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jtb8j\" (UniqueName: \"kubernetes.io/projected/8df7239f-461c-4207-bddd-da329e7d0c91-kube-api-access-jtb8j\") pod \"csi-node-driver-vfn6r\" (UID: \"8df7239f-461c-4207-bddd-da329e7d0c91\") " pod="calico-system/csi-node-driver-vfn6r" Sep 13 00:53:37.950704 kubelet[1853]: I0913 00:53:37.950480 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/68481098-0844-42ed-bb67-add51c0f61a3-kube-proxy\") pod \"kube-proxy-dcjp2\" (UID: \"68481098-0844-42ed-bb67-add51c0f61a3\") " pod="kube-system/kube-proxy-dcjp2" Sep 13 00:53:37.950704 kubelet[1853]: I0913 00:53:37.950511 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-cni-bin-dir\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950704 kubelet[1853]: I0913 00:53:37.950542 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-flexvol-driver-host\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950859 kubelet[1853]: I0913 00:53:37.950566 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/498c01d9-f113-4159-ae58-d67dd8fdebb5-node-certs\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950859 kubelet[1853]: I0913 00:53:37.950591 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-var-run-calico\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:37.950859 kubelet[1853]: I0913 00:53:37.950617 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8df7239f-461c-4207-bddd-da329e7d0c91-kubelet-dir\") pod \"csi-node-driver-vfn6r\" (UID: \"8df7239f-461c-4207-bddd-da329e7d0c91\") " pod="calico-system/csi-node-driver-vfn6r" Sep 13 00:53:37.950859 kubelet[1853]: I0913 00:53:37.950640 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8df7239f-461c-4207-bddd-da329e7d0c91-varrun\") pod \"csi-node-driver-vfn6r\" (UID: \"8df7239f-461c-4207-bddd-da329e7d0c91\") " pod="calico-system/csi-node-driver-vfn6r" Sep 13 00:53:37.950859 kubelet[1853]: I0913 00:53:37.950663 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/498c01d9-f113-4159-ae58-d67dd8fdebb5-xtables-lock\") pod \"calico-node-5gf6r\" (UID: \"498c01d9-f113-4159-ae58-d67dd8fdebb5\") " pod="calico-system/calico-node-5gf6r" Sep 13 00:53:38.051810 kubelet[1853]: I0913 00:53:38.051773 1853 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:53:38.054490 kubelet[1853]: E0913 00:53:38.054462 1853 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:53:38.054629 kubelet[1853]: W0913 00:53:38.054613 1853 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:53:38.054714 kubelet[1853]: E0913 00:53:38.054704 1853 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:53:38.055696 kubelet[1853]: E0913 00:53:38.055683 1853 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:53:38.055805 kubelet[1853]: W0913 00:53:38.055792 1853 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:53:38.055892 kubelet[1853]: E0913 00:53:38.055881 1853 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:53:38.068557 kubelet[1853]: E0913 00:53:38.068542 1853 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:53:38.068670 kubelet[1853]: W0913 00:53:38.068659 1853 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:53:38.068741 kubelet[1853]: E0913 00:53:38.068728 1853 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:53:38.074373 kubelet[1853]: E0913 00:53:38.074357 1853 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:53:38.074373 kubelet[1853]: W0913 00:53:38.074373 1853 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:53:38.074501 kubelet[1853]: E0913 00:53:38.074387 1853 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:53:38.080965 kubelet[1853]: E0913 00:53:38.080938 1853 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:53:38.080965 kubelet[1853]: W0913 00:53:38.080960 1853 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:53:38.081104 kubelet[1853]: E0913 00:53:38.080974 1853 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:53:38.230286 env[1412]: time="2025-09-13T00:53:38.229191181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dcjp2,Uid:68481098-0844-42ed-bb67-add51c0f61a3,Namespace:kube-system,Attempt:0,}" Sep 13 00:53:38.234541 env[1412]: time="2025-09-13T00:53:38.234509195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5gf6r,Uid:498c01d9-f113-4159-ae58-d67dd8fdebb5,Namespace:calico-system,Attempt:0,}" Sep 13 00:53:38.912976 kubelet[1853]: E0913 00:53:38.912946 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:39.549395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount310114042.mount: Deactivated successfully. Sep 13 00:53:39.623651 env[1412]: time="2025-09-13T00:53:39.623596429Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.626985 env[1412]: time="2025-09-13T00:53:39.626943237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.638731 env[1412]: time="2025-09-13T00:53:39.638696365Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.641885 env[1412]: time="2025-09-13T00:53:39.641853272Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.645147 env[1412]: time="2025-09-13T00:53:39.645114580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.648094 env[1412]: time="2025-09-13T00:53:39.648064187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.651237 env[1412]: time="2025-09-13T00:53:39.651209895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.655465 env[1412]: time="2025-09-13T00:53:39.655433905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:39.712538 env[1412]: time="2025-09-13T00:53:39.707523629Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:39.712538 env[1412]: time="2025-09-13T00:53:39.707563629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:39.712538 env[1412]: time="2025-09-13T00:53:39.707578229Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:39.713232 env[1412]: time="2025-09-13T00:53:39.712983742Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f pid=1905 runtime=io.containerd.runc.v2 Sep 13 00:53:39.722107 env[1412]: time="2025-09-13T00:53:39.722034364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:39.722107 env[1412]: time="2025-09-13T00:53:39.722077964Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:39.722348 env[1412]: time="2025-09-13T00:53:39.722093764Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:39.722519 env[1412]: time="2025-09-13T00:53:39.722474065Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ff0254b4b7b3405357b1c7bbc6069856dda37dbda9e4e39642f4be993b324ae pid=1921 runtime=io.containerd.runc.v2 Sep 13 00:53:39.738682 systemd[1]: Started cri-containerd-b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f.scope. Sep 13 00:53:39.744984 systemd[1]: Started cri-containerd-4ff0254b4b7b3405357b1c7bbc6069856dda37dbda9e4e39642f4be993b324ae.scope. Sep 13 00:53:39.766833 kernel: kauditd_printk_skb: 242 callbacks suppressed Sep 13 00:53:39.766948 kernel: audit: type=1400 audit(1757724819.762:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.801769 kernel: audit: type=1400 audit(1757724819.762:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.801887 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:53:39.801914 kernel: audit: type=1400 audit(1757724819.762:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.801934 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.818461 kernel: audit: type=1400 audit(1757724819.762:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.818548 kernel: audit: backlog limit exceeded Sep 13 00:53:39.818574 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.846490 kernel: audit: type=1400 audit(1757724819.762:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.846616 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit: BPF prog-id=62 op=LOAD Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1905 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383832616433646262363930306337323337386639363033613833 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1905 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383832616433646262363930306337323337386639363033613833 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit: BPF prog-id=63 op=LOAD Sep 13 00:53:39.776000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000347ce0 items=0 ppid=1905 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383832616433646262363930306337323337386639363033613833 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit: BPF prog-id=64 op=LOAD Sep 13 00:53:39.776000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000347d28 items=0 ppid=1905 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383832616433646262363930306337323337386639363033613833 Sep 13 00:53:39.776000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:53:39.776000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { perfmon } for pid=1934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit[1934]: AVC avc: denied { bpf } for pid=1934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.776000 audit: BPF prog-id=65 op=LOAD Sep 13 00:53:39.776000 audit[1934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b0138 items=0 ppid=1905 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383832616433646262363930306337323337386639363033613833 Sep 13 00:53:39.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.845000 audit: BPF prog-id=66 op=LOAD Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1921 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663032353462346237623334303533353762316337626263363036 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1921 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663032353462346237623334303533353762316337626263363036 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.848000 audit: BPF prog-id=67 op=LOAD Sep 13 00:53:39.848000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000386ea0 items=0 ppid=1921 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663032353462346237623334303533353762316337626263363036 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit: BPF prog-id=68 op=LOAD Sep 13 00:53:39.853000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000386ee8 items=0 ppid=1921 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663032353462346237623334303533353762316337626263363036 Sep 13 00:53:39.853000 audit: BPF prog-id=68 op=UNLOAD Sep 13 00:53:39.853000 audit: BPF prog-id=67 op=UNLOAD Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:39.853000 audit: BPF prog-id=69 op=LOAD Sep 13 00:53:39.853000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003872f8 items=0 ppid=1921 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:39.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663032353462346237623334303533353762316337626263363036 Sep 13 00:53:39.866408 env[1412]: time="2025-09-13T00:53:39.866364308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5gf6r,Uid:498c01d9-f113-4159-ae58-d67dd8fdebb5,Namespace:calico-system,Attempt:0,} returns sandbox id \"b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f\"" Sep 13 00:53:39.868463 env[1412]: time="2025-09-13T00:53:39.868416513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dcjp2,Uid:68481098-0844-42ed-bb67-add51c0f61a3,Namespace:kube-system,Attempt:0,} returns sandbox id \"4ff0254b4b7b3405357b1c7bbc6069856dda37dbda9e4e39642f4be993b324ae\"" Sep 13 00:53:39.870968 env[1412]: time="2025-09-13T00:53:39.870938119Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:53:39.913842 kubelet[1853]: E0913 00:53:39.913802 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:39.963718 kubelet[1853]: E0913 00:53:39.963681 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:40.914519 kubelet[1853]: E0913 00:53:40.914483 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:41.122242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2956290555.mount: Deactivated successfully. Sep 13 00:53:41.290821 env[1412]: time="2025-09-13T00:53:41.290561573Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:41.297213 env[1412]: time="2025-09-13T00:53:41.297181587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:41.300765 env[1412]: time="2025-09-13T00:53:41.300733894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:41.351627 env[1412]: time="2025-09-13T00:53:41.351572301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:41.352166 env[1412]: time="2025-09-13T00:53:41.352116702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:53:41.353957 env[1412]: time="2025-09-13T00:53:41.353927805Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\"" Sep 13 00:53:41.354843 env[1412]: time="2025-09-13T00:53:41.354810607Z" level=info msg="CreateContainer within sandbox \"b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:53:41.379614 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1627396507.mount: Deactivated successfully. Sep 13 00:53:41.396783 env[1412]: time="2025-09-13T00:53:41.396746395Z" level=info msg="CreateContainer within sandbox \"b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"163a6ddfa52b1a31c1f82799bfe53a36ceb5b0b53e0019420454594bd7bef111\"" Sep 13 00:53:41.397401 env[1412]: time="2025-09-13T00:53:41.397371997Z" level=info msg="StartContainer for \"163a6ddfa52b1a31c1f82799bfe53a36ceb5b0b53e0019420454594bd7bef111\"" Sep 13 00:53:41.412797 systemd[1]: Started cri-containerd-163a6ddfa52b1a31c1f82799bfe53a36ceb5b0b53e0019420454594bd7bef111.scope. Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3376fea998 items=0 ppid=1905 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:41.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336136646466613532623161333163316638323739396266653533 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit: BPF prog-id=70 op=LOAD Sep 13 00:53:41.428000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00026df58 items=0 ppid=1905 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:41.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336136646466613532623161333163316638323739396266653533 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit: BPF prog-id=71 op=LOAD Sep 13 00:53:41.428000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00026dfa8 items=0 ppid=1905 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:41.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336136646466613532623161333163316638323739396266653533 Sep 13 00:53:41.428000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:53:41.428000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { perfmon } for pid=1989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit[1989]: AVC avc: denied { bpf } for pid=1989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:41.428000 audit: BPF prog-id=72 op=LOAD Sep 13 00:53:41.428000 audit[1989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a8038 items=0 ppid=1905 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:41.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336136646466613532623161333163316638323739396266653533 Sep 13 00:53:41.448302 env[1412]: time="2025-09-13T00:53:41.448274003Z" level=info msg="StartContainer for \"163a6ddfa52b1a31c1f82799bfe53a36ceb5b0b53e0019420454594bd7bef111\" returns successfully" Sep 13 00:53:41.454335 systemd[1]: cri-containerd-163a6ddfa52b1a31c1f82799bfe53a36ceb5b0b53e0019420454594bd7bef111.scope: Deactivated successfully. Sep 13 00:53:41.459000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:53:41.655467 env[1412]: time="2025-09-13T00:53:41.655406537Z" level=info msg="shim disconnected" id=163a6ddfa52b1a31c1f82799bfe53a36ceb5b0b53e0019420454594bd7bef111 Sep 13 00:53:41.655467 env[1412]: time="2025-09-13T00:53:41.655461737Z" level=warning msg="cleaning up after shim disconnected" id=163a6ddfa52b1a31c1f82799bfe53a36ceb5b0b53e0019420454594bd7bef111 namespace=k8s.io Sep 13 00:53:41.655467 env[1412]: time="2025-09-13T00:53:41.655473537Z" level=info msg="cleaning up dead shim" Sep 13 00:53:41.663682 env[1412]: time="2025-09-13T00:53:41.663644655Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:53:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2028 runtime=io.containerd.runc.v2\n" Sep 13 00:53:41.915090 kubelet[1853]: E0913 00:53:41.915006 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:41.963635 kubelet[1853]: E0913 00:53:41.963588 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:42.915165 kubelet[1853]: E0913 00:53:42.915104 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:42.989442 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount485041280.mount: Deactivated successfully. Sep 13 00:53:43.677780 env[1412]: time="2025-09-13T00:53:43.677726173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:43.683658 env[1412]: time="2025-09-13T00:53:43.683627484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:43.687440 env[1412]: time="2025-09-13T00:53:43.687404991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:43.690491 env[1412]: time="2025-09-13T00:53:43.690462996Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:43.690786 env[1412]: time="2025-09-13T00:53:43.690759097Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\" returns image reference \"sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7\"" Sep 13 00:53:43.692700 env[1412]: time="2025-09-13T00:53:43.692668200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:53:43.692961 env[1412]: time="2025-09-13T00:53:43.692928301Z" level=info msg="CreateContainer within sandbox \"4ff0254b4b7b3405357b1c7bbc6069856dda37dbda9e4e39642f4be993b324ae\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:53:43.723654 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3559606786.mount: Deactivated successfully. Sep 13 00:53:43.744290 env[1412]: time="2025-09-13T00:53:43.744240895Z" level=info msg="CreateContainer within sandbox \"4ff0254b4b7b3405357b1c7bbc6069856dda37dbda9e4e39642f4be993b324ae\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2de7c78b746b989cd5238f9594131f229cc577c2e5c9eabf6e99b85a34789894\"" Sep 13 00:53:43.744920 env[1412]: time="2025-09-13T00:53:43.744891796Z" level=info msg="StartContainer for \"2de7c78b746b989cd5238f9594131f229cc577c2e5c9eabf6e99b85a34789894\"" Sep 13 00:53:43.769463 systemd[1]: Started cri-containerd-2de7c78b746b989cd5238f9594131f229cc577c2e5c9eabf6e99b85a34789894.scope. Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff49db1f228 items=0 ppid=1921 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264653763373862373436623938396364353233386639353934313331 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit: BPF prog-id=73 op=LOAD Sep 13 00:53:43.787000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c5c88 items=0 ppid=1921 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264653763373862373436623938396364353233386639353934313331 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit: BPF prog-id=74 op=LOAD Sep 13 00:53:43.787000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002c5cd8 items=0 ppid=1921 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264653763373862373436623938396364353233386639353934313331 Sep 13 00:53:43.787000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:53:43.787000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:43.787000 audit: BPF prog-id=75 op=LOAD Sep 13 00:53:43.787000 audit[2056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002c5d68 items=0 ppid=1921 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264653763373862373436623938396364353233386639353934313331 Sep 13 00:53:43.807250 env[1412]: time="2025-09-13T00:53:43.807208511Z" level=info msg="StartContainer for \"2de7c78b746b989cd5238f9594131f229cc577c2e5c9eabf6e99b85a34789894\" returns successfully" Sep 13 00:53:43.901000 audit[2115]: NETFILTER_CFG table=mangle:21 family=10 entries=1 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:43.901000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee4ef13f0 a2=0 a3=7ffee4ef13dc items=0 ppid=2066 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:53:43.902000 audit[2116]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:43.902000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffac62d630 a2=0 a3=7fffac62d61c items=0 ppid=2066 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:53:43.903000 audit[2117]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:43.903000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff5e9cfd0 a2=0 a3=7ffff5e9cfbc items=0 ppid=2066 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:53:43.905000 audit[2118]: NETFILTER_CFG table=mangle:24 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:43.905000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc07afadc0 a2=0 a3=7ffc07afadac items=0 ppid=2066 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:53:43.906000 audit[2119]: NETFILTER_CFG table=nat:25 family=2 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:43.906000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc84169b80 a2=0 a3=7ffc84169b6c items=0 ppid=2066 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:53:43.907000 audit[2120]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:43.907000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc785ac70 a2=0 a3=7ffcc785ac5c items=0 ppid=2066 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:43.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:53:43.915646 kubelet[1853]: E0913 00:53:43.915615 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:43.963323 kubelet[1853]: E0913 00:53:43.963223 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:43.996726 kubelet[1853]: I0913 00:53:43.996663 1853 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-dcjp2" podStartSLOduration=3.175409179 podStartE2EDuration="6.99664956s" podCreationTimestamp="2025-09-13 00:53:37 +0000 UTC" firstStartedPulling="2025-09-13 00:53:39.870524818 +0000 UTC m=+4.209913879" lastFinishedPulling="2025-09-13 00:53:43.691765199 +0000 UTC m=+8.031154260" observedRunningTime="2025-09-13 00:53:43.996162159 +0000 UTC m=+8.335551320" watchObservedRunningTime="2025-09-13 00:53:43.99664956 +0000 UTC m=+8.336038621" Sep 13 00:53:44.003000 audit[2121]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.003000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff0a360e90 a2=0 a3=7fff0a360e7c items=0 ppid=2066 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:53:44.006000 audit[2123]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.006000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcb9461130 a2=0 a3=7ffcb946111c items=0 ppid=2066 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:53:44.011000 audit[2127]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.011000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeee0769e0 a2=0 a3=7ffeee0769cc items=0 ppid=2066 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:53:44.013000 audit[2128]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.013000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb0651ad0 a2=0 a3=7ffdb0651abc items=0 ppid=2066 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:53:44.016000 audit[2130]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.016000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdaa7e52b0 a2=0 a3=7ffdaa7e529c items=0 ppid=2066 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:53:44.017000 audit[2131]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.017000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff20d3c150 a2=0 a3=7fff20d3c13c items=0 ppid=2066 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:53:44.020000 audit[2133]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.020000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa01a5850 a2=0 a3=7fffa01a583c items=0 ppid=2066 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:53:44.025000 audit[2136]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.025000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf48c0970 a2=0 a3=7ffdf48c095c items=0 ppid=2066 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:53:44.026000 audit[2137]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.026000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffabe26d70 a2=0 a3=7fffabe26d5c items=0 ppid=2066 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:53:44.029000 audit[2139]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.029000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe57772030 a2=0 a3=7ffe5777201c items=0 ppid=2066 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:53:44.030000 audit[2140]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.030000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb708a220 a2=0 a3=7ffeb708a20c items=0 ppid=2066 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:53:44.033000 audit[2142]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.033000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff960f1730 a2=0 a3=7fff960f171c items=0 ppid=2066 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:53:44.037000 audit[2145]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_rule pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.037000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa905e0f0 a2=0 a3=7fffa905e0dc items=0 ppid=2066 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:53:44.040000 audit[2148]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_rule pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.040000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff81c45d20 a2=0 a3=7fff81c45d0c items=0 ppid=2066 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:53:44.041000 audit[2149]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.041000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefa37c440 a2=0 a3=7ffefa37c42c items=0 ppid=2066 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:53:44.044000 audit[2151]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.044000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdeb22ffd0 a2=0 a3=7ffdeb22ffbc items=0 ppid=2066 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:53:44.082000 audit[2155]: NETFILTER_CFG table=nat:43 family=2 entries=2 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.082000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffce3f3d870 a2=0 a3=7ffce3f3d85c items=0 ppid=2066 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:53:44.083000 audit[2156]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.083000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd15ed9e00 a2=0 a3=7ffd15ed9dec items=0 ppid=2066 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:53:44.085000 audit[2158]: NETFILTER_CFG table=nat:45 family=2 entries=2 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:53:44.085000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee965b490 a2=0 a3=7ffee965b47c items=0 ppid=2066 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:53:44.107000 audit[2164]: NETFILTER_CFG table=filter:46 family=2 entries=5 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:44.107000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcd71cdaa0 a2=0 a3=7ffcd71cda8c items=0 ppid=2066 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:44.182000 audit[2164]: NETFILTER_CFG table=nat:47 family=2 entries=79 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:44.182000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=38092 a0=3 a1=7ffcd71cdaa0 a2=0 a3=7ffcd71cda8c items=0 ppid=2066 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:44.203000 audit[2173]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.203000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb74740b0 a2=0 a3=7fffb747409c items=0 ppid=2066 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:53:44.206000 audit[2175]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.206000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb27c3060 a2=0 a3=7ffdb27c304c items=0 ppid=2066 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:53:44.210000 audit[2178]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.210000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc04d21580 a2=0 a3=7ffc04d2156c items=0 ppid=2066 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:53:44.211000 audit[2179]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.211000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3af28ce0 a2=0 a3=7fff3af28ccc items=0 ppid=2066 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:53:44.213000 audit[2181]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.213000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4b94e1c0 a2=0 a3=7ffd4b94e1ac items=0 ppid=2066 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:53:44.215000 audit[2182]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.215000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7586f860 a2=0 a3=7fff7586f84c items=0 ppid=2066 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:53:44.218000 audit[2184]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.218000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff4994f00 a2=0 a3=7ffff4994eec items=0 ppid=2066 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:53:44.222000 audit[2187]: NETFILTER_CFG table=filter:55 family=10 entries=2 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.222000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffb331b230 a2=0 a3=7fffb331b21c items=0 ppid=2066 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:53:44.223000 audit[2188]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.223000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd304bed30 a2=0 a3=7ffd304bed1c items=0 ppid=2066 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:53:44.226000 audit[2190]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.226000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef7226a00 a2=0 a3=7ffef72269ec items=0 ppid=2066 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:53:44.228000 audit[2191]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.228000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddf7a9d60 a2=0 a3=7ffddf7a9d4c items=0 ppid=2066 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:53:44.230000 audit[2193]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.230000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa2218570 a2=0 a3=7fffa221855c items=0 ppid=2066 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:53:44.234000 audit[2196]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.234000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0b2d3350 a2=0 a3=7fff0b2d333c items=0 ppid=2066 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:53:44.237000 audit[2199]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.237000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc63bfc1b0 a2=0 a3=7ffc63bfc19c items=0 ppid=2066 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:53:44.238000 audit[2200]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.238000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5b572f70 a2=0 a3=7ffc5b572f5c items=0 ppid=2066 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:53:44.240000 audit[2202]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.240000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc2536d30 a2=0 a3=7ffdc2536d1c items=0 ppid=2066 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:53:44.244000 audit[2205]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.244000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdea6b6e80 a2=0 a3=7ffdea6b6e6c items=0 ppid=2066 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:53:44.245000 audit[2206]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.245000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd517973e0 a2=0 a3=7ffd517973cc items=0 ppid=2066 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:53:44.247000 audit[2208]: NETFILTER_CFG table=nat:66 family=10 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.247000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe66648190 a2=0 a3=7ffe6664817c items=0 ppid=2066 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:53:44.249000 audit[2209]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.249000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3394e600 a2=0 a3=7fff3394e5ec items=0 ppid=2066 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:53:44.251000 audit[2211]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.251000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe700d6030 a2=0 a3=7ffe700d601c items=0 ppid=2066 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:53:44.254000 audit[2214]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:53:44.254000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffccd41d430 a2=0 a3=7ffccd41d41c items=0 ppid=2066 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:53:44.257000 audit[2216]: NETFILTER_CFG table=filter:70 family=10 entries=3 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:53:44.257000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffb1652d50 a2=0 a3=7fffb1652d3c items=0 ppid=2066 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.257000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:44.258000 audit[2216]: NETFILTER_CFG table=nat:71 family=10 entries=7 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:53:44.258000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffb1652d50 a2=0 a3=7fffb1652d3c items=0 ppid=2066 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:44.258000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:44.915946 kubelet[1853]: E0913 00:53:44.915857 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:45.916870 kubelet[1853]: E0913 00:53:45.916829 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:45.964038 kubelet[1853]: E0913 00:53:45.963455 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:46.917397 kubelet[1853]: E0913 00:53:46.917345 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:47.230169 env[1412]: time="2025-09-13T00:53:47.230047858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:47.235911 env[1412]: time="2025-09-13T00:53:47.235878766Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:47.243800 env[1412]: time="2025-09-13T00:53:47.243768977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:47.248481 env[1412]: time="2025-09-13T00:53:47.248453884Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:47.248915 env[1412]: time="2025-09-13T00:53:47.248887284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:53:47.251038 env[1412]: time="2025-09-13T00:53:47.251009787Z" level=info msg="CreateContainer within sandbox \"b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:53:47.289103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1911227640.mount: Deactivated successfully. Sep 13 00:53:47.357760 env[1412]: time="2025-09-13T00:53:47.357706239Z" level=info msg="CreateContainer within sandbox \"b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb\"" Sep 13 00:53:47.358342 env[1412]: time="2025-09-13T00:53:47.358281240Z" level=info msg="StartContainer for \"2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb\"" Sep 13 00:53:47.383820 systemd[1]: Started cri-containerd-2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb.scope. Sep 13 00:53:47.410168 kernel: kauditd_printk_skb: 348 callbacks suppressed Sep 13 00:53:47.410299 kernel: audit: type=1400 audit(1757724827.403:529): avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.446875 kernel: audit: type=1300 audit(1757724827.403:529): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f898dd3a2c8 items=0 ppid=1905 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:47.403000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f898dd3a2c8 items=0 ppid=1905 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:47.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323433653465376537666133383965313362303432383436346530 Sep 13 00:53:47.468152 kernel: audit: type=1327 audit(1757724827.403:529): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323433653465376537666133383965313362303432383436346530 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.488090 kernel: audit: type=1400 audit(1757724827.403:530): avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.488188 kernel: audit: type=1400 audit(1757724827.403:530): avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.511170 kernel: audit: type=1400 audit(1757724827.403:530): avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.526293 kernel: audit: type=1400 audit(1757724827.403:530): avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.541335 kernel: audit: type=1400 audit(1757724827.403:530): avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.541494 env[1412]: time="2025-09-13T00:53:47.526503679Z" level=info msg="StartContainer for \"2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb\" returns successfully" Sep 13 00:53:47.557229 kernel: audit: type=1400 audit(1757724827.403:530): avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.572480 kernel: audit: type=1400 audit(1757724827.403:530): avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.403000 audit: BPF prog-id=76 op=LOAD Sep 13 00:53:47.403000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=1905 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:47.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323433653465376537666133383965313362303432383436346530 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.423000 audit: BPF prog-id=77 op=LOAD Sep 13 00:53:47.423000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003886c8 items=0 ppid=1905 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:47.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323433653465376537666133383965313362303432383436346530 Sep 13 00:53:47.445000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:53:47.445000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:47.445000 audit: BPF prog-id=78 op=LOAD Sep 13 00:53:47.445000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000388758 items=0 ppid=1905 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:47.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263323433653465376537666133383965313362303432383436346530 Sep 13 00:53:47.917800 kubelet[1853]: E0913 00:53:47.917765 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:47.963412 kubelet[1853]: E0913 00:53:47.963353 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:48.918176 kubelet[1853]: E0913 00:53:48.918113 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:49.279935 env[1412]: time="2025-09-13T00:53:49.279808137Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:53:49.281874 systemd[1]: cri-containerd-2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb.scope: Deactivated successfully. Sep 13 00:53:49.285000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:53:49.300724 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb-rootfs.mount: Deactivated successfully. Sep 13 00:53:49.325739 kubelet[1853]: I0913 00:53:49.325565 1853 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 13 00:53:49.918404 kubelet[1853]: E0913 00:53:49.918331 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:49.967974 systemd[1]: Created slice kubepods-besteffort-pod8df7239f_461c_4207_bddd_da329e7d0c91.slice. Sep 13 00:53:49.970176 env[1412]: time="2025-09-13T00:53:49.970119100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfn6r,Uid:8df7239f-461c-4207-bddd-da329e7d0c91,Namespace:calico-system,Attempt:0,}" Sep 13 00:53:50.918558 kubelet[1853]: E0913 00:53:50.918526 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:51.446665 env[1412]: time="2025-09-13T00:53:51.446619002Z" level=info msg="shim disconnected" id=2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb Sep 13 00:53:51.446665 env[1412]: time="2025-09-13T00:53:51.446661802Z" level=warning msg="cleaning up after shim disconnected" id=2c243e4e7e7fa389e13b0428464e050b09e114d7fd2e3831910c870bda1c7edb namespace=k8s.io Sep 13 00:53:51.447110 env[1412]: time="2025-09-13T00:53:51.446672802Z" level=info msg="cleaning up dead shim" Sep 13 00:53:51.454408 env[1412]: time="2025-09-13T00:53:51.454372310Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:53:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2265 runtime=io.containerd.runc.v2\n" Sep 13 00:53:51.533434 env[1412]: time="2025-09-13T00:53:51.533360797Z" level=error msg="Failed to destroy network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:51.536541 env[1412]: time="2025-09-13T00:53:51.536091500Z" level=error msg="encountered an error cleaning up failed sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:51.536541 env[1412]: time="2025-09-13T00:53:51.536174700Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfn6r,Uid:8df7239f-461c-4207-bddd-da329e7d0c91,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:51.535568 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba-shm.mount: Deactivated successfully. Sep 13 00:53:51.536973 kubelet[1853]: E0913 00:53:51.536927 1853 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:51.537062 kubelet[1853]: E0913 00:53:51.537020 1853 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vfn6r" Sep 13 00:53:51.537062 kubelet[1853]: E0913 00:53:51.537048 1853 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vfn6r" Sep 13 00:53:51.537175 kubelet[1853]: E0913 00:53:51.537112 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vfn6r_calico-system(8df7239f-461c-4207-bddd-da329e7d0c91)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vfn6r_calico-system(8df7239f-461c-4207-bddd-da329e7d0c91)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:51.918924 kubelet[1853]: E0913 00:53:51.918822 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:52.000303 kubelet[1853]: I0913 00:53:52.000267 1853 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:53:52.001070 env[1412]: time="2025-09-13T00:53:52.001033711Z" level=info msg="StopPodSandbox for \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\"" Sep 13 00:53:52.003883 env[1412]: time="2025-09-13T00:53:52.003801614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:53:52.027903 env[1412]: time="2025-09-13T00:53:52.027847439Z" level=error msg="StopPodSandbox for \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\" failed" error="failed to destroy network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:52.028045 kubelet[1853]: E0913 00:53:52.027999 1853 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:53:52.028105 kubelet[1853]: E0913 00:53:52.028048 1853 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba"} Sep 13 00:53:52.028158 kubelet[1853]: E0913 00:53:52.028108 1853 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8df7239f-461c-4207-bddd-da329e7d0c91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:53:52.028243 kubelet[1853]: E0913 00:53:52.028155 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8df7239f-461c-4207-bddd-da329e7d0c91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vfn6r" podUID="8df7239f-461c-4207-bddd-da329e7d0c91" Sep 13 00:53:52.188438 systemd[1]: Created slice kubepods-besteffort-pod365dcef4_d0cb_473c_8763_c0672c3522b6.slice. Sep 13 00:53:52.232185 kubelet[1853]: I0913 00:53:52.232152 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gpl8t\" (UniqueName: \"kubernetes.io/projected/365dcef4-d0cb-473c-8763-c0672c3522b6-kube-api-access-gpl8t\") pod \"nginx-deployment-8587fbcb89-6tgps\" (UID: \"365dcef4-d0cb-473c-8763-c0672c3522b6\") " pod="default/nginx-deployment-8587fbcb89-6tgps" Sep 13 00:53:52.492524 env[1412]: time="2025-09-13T00:53:52.492177317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6tgps,Uid:365dcef4-d0cb-473c-8763-c0672c3522b6,Namespace:default,Attempt:0,}" Sep 13 00:53:52.577710 env[1412]: time="2025-09-13T00:53:52.577651505Z" level=error msg="Failed to destroy network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:52.578219 env[1412]: time="2025-09-13T00:53:52.578178006Z" level=error msg="encountered an error cleaning up failed sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:52.578375 env[1412]: time="2025-09-13T00:53:52.578342306Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6tgps,Uid:365dcef4-d0cb-473c-8763-c0672c3522b6,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:52.579223 kubelet[1853]: E0913 00:53:52.578723 1853 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:52.579223 kubelet[1853]: E0913 00:53:52.578801 1853 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-6tgps" Sep 13 00:53:52.579223 kubelet[1853]: E0913 00:53:52.578845 1853 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-6tgps" Sep 13 00:53:52.579439 kubelet[1853]: E0913 00:53:52.578899 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-6tgps_default(365dcef4-d0cb-473c-8763-c0672c3522b6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-6tgps_default(365dcef4-d0cb-473c-8763-c0672c3522b6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-6tgps" podUID="365dcef4-d0cb-473c-8763-c0672c3522b6" Sep 13 00:53:52.581487 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16-shm.mount: Deactivated successfully. Sep 13 00:53:52.919597 kubelet[1853]: E0913 00:53:52.919563 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:53.005335 kubelet[1853]: I0913 00:53:53.005306 1853 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:53:53.005914 env[1412]: time="2025-09-13T00:53:53.005876046Z" level=info msg="StopPodSandbox for \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\"" Sep 13 00:53:53.042210 env[1412]: time="2025-09-13T00:53:53.042159681Z" level=error msg="StopPodSandbox for \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\" failed" error="failed to destroy network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:53:53.042376 kubelet[1853]: E0913 00:53:53.042343 1853 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:53:53.042457 kubelet[1853]: E0913 00:53:53.042388 1853 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16"} Sep 13 00:53:53.042457 kubelet[1853]: E0913 00:53:53.042430 1853 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"365dcef4-d0cb-473c-8763-c0672c3522b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:53:53.042565 kubelet[1853]: E0913 00:53:53.042459 1853 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"365dcef4-d0cb-473c-8763-c0672c3522b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-6tgps" podUID="365dcef4-d0cb-473c-8763-c0672c3522b6" Sep 13 00:53:53.920661 kubelet[1853]: E0913 00:53:53.920620 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:54.921623 kubelet[1853]: E0913 00:53:54.921581 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:55.922623 kubelet[1853]: E0913 00:53:55.922587 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:56.912223 kubelet[1853]: E0913 00:53:56.912186 1853 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:56.923638 kubelet[1853]: E0913 00:53:56.923619 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:57.464160 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Sep 13 00:53:57.924673 kubelet[1853]: E0913 00:53:57.924613 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:58.142002 update_engine[1402]: I0913 00:53:58.141386 1402 update_attempter.cc:509] Updating boot flags... Sep 13 00:53:58.925053 kubelet[1853]: E0913 00:53:58.924999 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:59.925763 kubelet[1853]: E0913 00:53:59.925709 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:00.926651 kubelet[1853]: E0913 00:54:00.926611 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:01.079581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount212267659.mount: Deactivated successfully. Sep 13 00:54:01.119504 env[1412]: time="2025-09-13T00:54:01.119459044Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:01.125990 env[1412]: time="2025-09-13T00:54:01.125954947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:01.129805 env[1412]: time="2025-09-13T00:54:01.129778450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:01.133122 env[1412]: time="2025-09-13T00:54:01.133096652Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:01.133457 env[1412]: time="2025-09-13T00:54:01.133422552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:54:01.148348 env[1412]: time="2025-09-13T00:54:01.148311560Z" level=info msg="CreateContainer within sandbox \"b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:54:01.181386 env[1412]: time="2025-09-13T00:54:01.181260679Z" level=info msg="CreateContainer within sandbox \"b1882ad3dbb6900c72378f9603a83289bfa9e1e7950bcf82c6f232141202e69f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6\"" Sep 13 00:54:01.182016 env[1412]: time="2025-09-13T00:54:01.181980880Z" level=info msg="StartContainer for \"db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6\"" Sep 13 00:54:01.201313 systemd[1]: Started cri-containerd-db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6.scope. Sep 13 00:54:01.218000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225532 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 00:54:01.225619 kernel: audit: type=1400 audit(1757724841.218:536): avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.218000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8a0738d2f8 items=0 ppid=1905 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:01.261642 kernel: audit: type=1300 audit(1757724841.218:536): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8a0738d2f8 items=0 ppid=1905 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:01.282147 kernel: audit: type=1327 audit(1757724841.218:536): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313865383132386465326435303431383732383030353164333363 Sep 13 00:54:01.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313865383132386465326435303431383732383030353164333363 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.298275 kernel: audit: type=1400 audit(1757724841.225:537): avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.329193 kernel: audit: type=1400 audit(1757724841.225:537): avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.329285 kernel: audit: type=1400 audit(1757724841.225:537): avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.344847 kernel: audit: type=1400 audit(1757724841.225:537): avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.344949 kernel: audit: type=1400 audit(1757724841.225:537): avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.354571 env[1412]: time="2025-09-13T00:54:01.354528179Z" level=info msg="StartContainer for \"db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6\" returns successfully" Sep 13 00:54:01.361158 kernel: audit: type=1400 audit(1757724841.225:537): avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.387550 kernel: audit: type=1400 audit(1757724841.225:537): avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.225000 audit: BPF prog-id=79 op=LOAD Sep 13 00:54:01.225000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024408 items=0 ppid=1905 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:01.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313865383132386465326435303431383732383030353164333363 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit: BPF prog-id=80 op=LOAD Sep 13 00:54:01.260000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024458 items=0 ppid=1905 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:01.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313865383132386465326435303431383732383030353164333363 Sep 13 00:54:01.260000 audit: BPF prog-id=80 op=UNLOAD Sep 13 00:54:01.260000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:01.260000 audit: BPF prog-id=81 op=LOAD Sep 13 00:54:01.260000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000244e8 items=0 ppid=1905 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:01.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313865383132386465326435303431383732383030353164333363 Sep 13 00:54:01.906211 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:54:01.906337 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:54:01.927646 kubelet[1853]: E0913 00:54:01.927617 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:02.928633 kubelet[1853]: E0913 00:54:02.928586 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:03.058622 systemd[1]: run-containerd-runc-k8s.io-db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6-runc.hOQwFS.mount: Deactivated successfully. Sep 13 00:54:03.209000 audit[2526]: AVC avc: denied { write } for pid=2526 comm="tee" name="fd" dev="proc" ino=23231 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:54:03.209000 audit[2526]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5bace7e1 a2=241 a3=1b6 items=1 ppid=2514 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.209000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:54:03.209000 audit: PATH item=0 name="/dev/fd/63" inode=22517 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:03.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:54:03.265000 audit[2543]: AVC avc: denied { write } for pid=2543 comm="tee" name="fd" dev="proc" ino=23575 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:54:03.265000 audit[2543]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe185b17d1 a2=241 a3=1b6 items=1 ppid=2515 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.265000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:54:03.265000 audit: PATH item=0 name="/dev/fd/63" inode=22526 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:03.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:54:03.274000 audit[2561]: AVC avc: denied { write } for pid=2561 comm="tee" name="fd" dev="proc" ino=23266 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:54:03.278000 audit[2563]: AVC avc: denied { write } for pid=2563 comm="tee" name="fd" dev="proc" ino=23584 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:54:03.278000 audit[2563]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9140a7e0 a2=241 a3=1b6 items=1 ppid=2528 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.278000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:54:03.278000 audit: PATH item=0 name="/dev/fd/63" inode=23577 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:03.278000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:54:03.283000 audit[2565]: AVC avc: denied { write } for pid=2565 comm="tee" name="fd" dev="proc" ino=23273 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:54:03.283000 audit[2573]: AVC avc: denied { write } for pid=2573 comm="tee" name="fd" dev="proc" ino=23589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:54:03.283000 audit[2573]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddf7b07e0 a2=241 a3=1b6 items=1 ppid=2531 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.283000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:54:03.283000 audit: PATH item=0 name="/dev/fd/63" inode=23581 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:03.283000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:54:03.274000 audit[2561]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc997367d0 a2=241 a3=1b6 items=1 ppid=2530 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.274000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:54:03.274000 audit: PATH item=0 name="/dev/fd/63" inode=23259 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:03.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:54:03.283000 audit[2565]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc26bd47e2 a2=241 a3=1b6 items=1 ppid=2536 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.283000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:54:03.283000 audit: PATH item=0 name="/dev/fd/63" inode=23578 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:03.283000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:54:03.308000 audit[2588]: AVC avc: denied { write } for pid=2588 comm="tee" name="fd" dev="proc" ino=23279 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:54:03.308000 audit[2588]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9ccb07e0 a2=241 a3=1b6 items=1 ppid=2529 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.308000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:54:03.308000 audit: PATH item=0 name="/dev/fd/63" inode=23276 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:54:03.308000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.506000 audit: BPF prog-id=82 op=LOAD Sep 13 00:54:03.506000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff24226470 a2=98 a3=1fffffffffffffff items=0 ppid=2537 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.506000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:54:03.507000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit: BPF prog-id=83 op=LOAD Sep 13 00:54:03.507000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff24226350 a2=94 a3=3 items=0 ppid=2537 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.507000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:54:03.507000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit: BPF prog-id=84 op=LOAD Sep 13 00:54:03.507000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff24226390 a2=94 a3=7fff24226570 items=0 ppid=2537 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.507000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:54:03.507000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:54:03.507000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.507000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff24226460 a2=50 a3=a000000085 items=0 ppid=2537 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.507000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.509000 audit: BPF prog-id=85 op=LOAD Sep 13 00:54:03.509000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbab944a0 a2=98 a3=3 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.509000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.510000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit: BPF prog-id=86 op=LOAD Sep 13 00:54:03.510000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbab94290 a2=94 a3=54428f items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.510000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.510000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.510000 audit: BPF prog-id=87 op=LOAD Sep 13 00:54:03.510000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbab942c0 a2=94 a3=2 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.510000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.511000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit: BPF prog-id=88 op=LOAD Sep 13 00:54:03.615000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbab94180 a2=94 a3=1 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.615000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.615000 audit: BPF prog-id=88 op=UNLOAD Sep 13 00:54:03.615000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.615000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcbab94250 a2=50 a3=7ffcbab94330 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.615000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbab94190 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbab941c0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbab940d0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbab941e0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbab941c0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbab941b0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbab941e0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbab941c0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbab941e0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbab941b0 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbab94220 a2=28 a3=0 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbab93fd0 a2=50 a3=1 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit: BPF prog-id=89 op=LOAD Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbab93fd0 a2=94 a3=5 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit: BPF prog-id=89 op=UNLOAD Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbab94080 a2=50 a3=1 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcbab941a0 a2=4 a3=38 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.624000 audit[2622]: AVC avc: denied { confidentiality } for pid=2622 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:54:03.624000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbab941f0 a2=94 a3=6 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { confidentiality } for pid=2622 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:54:03.625000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbab939a0 a2=94 a3=88 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.625000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.625000 audit[2622]: AVC avc: denied { confidentiality } for pid=2622 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:54:03.625000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbab939a0 a2=94 a3=88 items=0 ppid=2537 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.625000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit: BPF prog-id=90 op=LOAD Sep 13 00:54:03.634000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7849dad0 a2=98 a3=1999999999999999 items=0 ppid=2537 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.634000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:54:03.634000 audit: BPF prog-id=90 op=UNLOAD Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit: BPF prog-id=91 op=LOAD Sep 13 00:54:03.634000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7849d9b0 a2=94 a3=ffff items=0 ppid=2537 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.634000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:54:03.634000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.634000 audit: BPF prog-id=92 op=LOAD Sep 13 00:54:03.634000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7849d9f0 a2=94 a3=7ffd7849dbd0 items=0 ppid=2537 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.634000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:54:03.635000 audit: BPF prog-id=92 op=UNLOAD Sep 13 00:54:03.790959 systemd-networkd[1564]: vxlan.calico: Link UP Sep 13 00:54:03.790967 systemd-networkd[1564]: vxlan.calico: Gained carrier Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit: BPF prog-id=93 op=LOAD Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8a5c0100 a2=98 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit: BPF prog-id=93 op=UNLOAD Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit: BPF prog-id=94 op=LOAD Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8a5bff10 a2=94 a3=54428f items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit: BPF prog-id=94 op=UNLOAD Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit: BPF prog-id=95 op=LOAD Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8a5bff40 a2=94 a3=2 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit: BPF prog-id=95 op=UNLOAD Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8a5bfe10 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8a5bfe40 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8a5bfd50 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8a5bfe60 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8a5bfe40 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8a5bfe30 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8a5bfe60 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8a5bfe40 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8a5bfe60 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.829000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.829000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8a5bfe30 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8a5bfea0 a2=28 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit: BPF prog-id=96 op=LOAD Sep 13 00:54:03.830000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8a5bfd10 a2=94 a3=0 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.830000 audit: BPF prog-id=96 op=UNLOAD Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc8a5bfd00 a2=50 a3=2800 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc8a5bfd00 a2=50 a3=2800 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit: BPF prog-id=97 op=LOAD Sep 13 00:54:03.830000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8a5bf520 a2=94 a3=2 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.830000 audit: BPF prog-id=97 op=UNLOAD Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.830000 audit: BPF prog-id=98 op=LOAD Sep 13 00:54:03.830000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8a5bf620 a2=94 a3=30 items=0 ppid=2537 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.836000 audit: BPF prog-id=99 op=LOAD Sep 13 00:54:03.836000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda09c69a0 a2=98 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.837000 audit: BPF prog-id=99 op=UNLOAD Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.837000 audit: BPF prog-id=100 op=LOAD Sep 13 00:54:03.837000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda09c6790 a2=94 a3=54428f items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.839000 audit: BPF prog-id=100 op=UNLOAD Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.839000 audit: BPF prog-id=101 op=LOAD Sep 13 00:54:03.839000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda09c67c0 a2=94 a3=2 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.839000 audit: BPF prog-id=101 op=UNLOAD Sep 13 00:54:03.929679 kubelet[1853]: E0913 00:54:03.929637 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit: BPF prog-id=102 op=LOAD Sep 13 00:54:03.954000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda09c6680 a2=94 a3=1 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.954000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:54:03.954000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.954000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffda09c6750 a2=50 a3=7ffda09c6830 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda09c6690 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda09c66c0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda09c65d0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda09c66e0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda09c66c0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda09c66b0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda09c66e0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda09c66c0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda09c66e0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda09c66b0 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.963000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.963000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda09c6720 a2=28 a3=0 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.963000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda09c64d0 a2=50 a3=1 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit: BPF prog-id=103 op=LOAD Sep 13 00:54:03.964000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda09c64d0 a2=94 a3=5 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.964000 audit: BPF prog-id=103 op=UNLOAD Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda09c6580 a2=50 a3=1 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffda09c66a0 a2=4 a3=38 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { confidentiality } for pid=2656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:54:03.964000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda09c66f0 a2=94 a3=6 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { confidentiality } for pid=2656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:54:03.964000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda09c5ea0 a2=94 a3=88 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.964000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda09c5ea0 a2=94 a3=88 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.965000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.965000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda09c78d0 a2=10 a3=f8f00800 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.965000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.965000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.965000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda09c7770 a2=10 a3=3 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.965000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.965000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.965000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda09c7710 a2=10 a3=3 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.965000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.965000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:03.965000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda09c7710 a2=10 a3=7 items=0 ppid=2537 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:03.965000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:54:03.974000 audit: BPF prog-id=98 op=UNLOAD Sep 13 00:54:04.218000 audit[2677]: NETFILTER_CFG table=mangle:72 family=2 entries=16 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:54:04.218000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff61650e20 a2=0 a3=7fff61650e0c items=0 ppid=2537 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:04.218000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:54:04.309000 audit[2681]: NETFILTER_CFG table=raw:73 family=2 entries=21 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:54:04.309000 audit[2681]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd360c8240 a2=0 a3=7ffd360c822c items=0 ppid=2537 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:04.309000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:54:04.316000 audit[2683]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2683 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:54:04.316000 audit[2683]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffffa9e9560 a2=0 a3=7ffffa9e954c items=0 ppid=2537 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:04.316000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:54:04.316000 audit[2682]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=2682 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:54:04.316000 audit[2682]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd18ee6200 a2=0 a3=7ffd18ee61ec items=0 ppid=2537 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:04.316000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:54:04.930174 kubelet[1853]: E0913 00:54:04.930139 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:05.797303 systemd-networkd[1564]: vxlan.calico: Gained IPv6LL Sep 13 00:54:06.206585 kubelet[1853]: E0913 00:54:05.931246 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:06.206585 kubelet[1853]: I0913 00:54:06.007432 1853 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5gf6r" podStartSLOduration=7.743655288 podStartE2EDuration="29.007396322s" podCreationTimestamp="2025-09-13 00:53:37 +0000 UTC" firstStartedPulling="2025-09-13 00:53:39.870506518 +0000 UTC m=+4.209895579" lastFinishedPulling="2025-09-13 00:54:01.134247552 +0000 UTC m=+25.473636613" observedRunningTime="2025-09-13 00:54:02.070343889 +0000 UTC m=+26.409733050" watchObservedRunningTime="2025-09-13 00:54:06.007396322 +0000 UTC m=+30.346785383" Sep 13 00:54:07.603782 env[1412]: time="2025-09-13T00:54:05.964286303Z" level=info msg="StopPodSandbox for \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\"" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.007 [INFO][2703] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.009 [INFO][2703] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" iface="eth0" netns="/var/run/netns/cni-b052b94c-7a86-cabd-743a-b7da8b37415f" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.009 [INFO][2703] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" iface="eth0" netns="/var/run/netns/cni-b052b94c-7a86-cabd-743a-b7da8b37415f" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.010 [INFO][2703] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" iface="eth0" netns="/var/run/netns/cni-b052b94c-7a86-cabd-743a-b7da8b37415f" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.010 [INFO][2703] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.010 [INFO][2703] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.029 [INFO][2710] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.029 [INFO][2710] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.029 [INFO][2710] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.036 [WARNING][2710] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.036 [INFO][2710] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.037 [INFO][2710] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:07.603782 env[1412]: 2025-09-13 00:54:06.039 [INFO][2703] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:07.603782 env[1412]: time="2025-09-13T00:54:06.041001136Z" level=info msg="TearDown network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\" successfully" Sep 13 00:54:07.603782 env[1412]: time="2025-09-13T00:54:06.041045136Z" level=info msg="StopPodSandbox for \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\" returns successfully" Sep 13 00:54:07.603782 env[1412]: time="2025-09-13T00:54:06.044442137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfn6r,Uid:8df7239f-461c-4207-bddd-da329e7d0c91,Namespace:calico-system,Attempt:1,}" Sep 13 00:54:07.603782 env[1412]: time="2025-09-13T00:54:06.964234421Z" level=info msg="StopPodSandbox for \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\"" Sep 13 00:54:06.042720 systemd[1]: run-netns-cni\x2db052b94c\x2d7a86\x2dcabd\x2d743a\x2db7da8b37415f.mount: Deactivated successfully. Sep 13 00:54:07.605218 kubelet[1853]: E0913 00:54:06.932175 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.005 [INFO][2726] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.603 [INFO][2726] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" iface="eth0" netns="/var/run/netns/cni-9b8587db-9005-a7ea-4b63-3be4d8cb586d" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.603 [INFO][2726] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" iface="eth0" netns="/var/run/netns/cni-9b8587db-9005-a7ea-4b63-3be4d8cb586d" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.603 [INFO][2726] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" iface="eth0" netns="/var/run/netns/cni-9b8587db-9005-a7ea-4b63-3be4d8cb586d" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.603 [INFO][2726] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.603 [INFO][2726] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.624 [INFO][2733] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.624 [INFO][2733] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.624 [INFO][2733] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.630 [WARNING][2733] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.630 [INFO][2733] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.632 [INFO][2733] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:07.634276 env[1412]: 2025-09-13 00:54:07.633 [INFO][2726] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:07.635274 env[1412]: time="2025-09-13T00:54:07.635229685Z" level=info msg="TearDown network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\" successfully" Sep 13 00:54:07.635385 env[1412]: time="2025-09-13T00:54:07.635367385Z" level=info msg="StopPodSandbox for \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\" returns successfully" Sep 13 00:54:07.636861 systemd[1]: run-netns-cni\x2d9b8587db\x2d9005\x2da7ea\x2d4b63\x2d3be4d8cb586d.mount: Deactivated successfully. Sep 13 00:54:07.638952 env[1412]: time="2025-09-13T00:54:07.638917086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6tgps,Uid:365dcef4-d0cb-473c-8763-c0672c3522b6,Namespace:default,Attempt:1,}" Sep 13 00:54:07.933063 kubelet[1853]: E0913 00:54:07.932966 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:08.933912 kubelet[1853]: E0913 00:54:08.933872 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:09.167112 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:54:09.167246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali610c3bc2524: link becomes ready Sep 13 00:54:09.167418 systemd-networkd[1564]: cali610c3bc2524: Link UP Sep 13 00:54:09.169148 systemd-networkd[1564]: cali610c3bc2524: Gained carrier Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.837 [INFO][2739] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.19-k8s-csi--node--driver--vfn6r-eth0 csi-node-driver- calico-system 8df7239f-461c-4207-bddd-da329e7d0c91 1416 0 2025-09-13 00:53:37 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.4.19 csi-node-driver-vfn6r eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali610c3bc2524 [] [] }} ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.837 [INFO][2739] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.861 [INFO][2753] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" HandleID="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.862 [INFO][2753] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" HandleID="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.4.19", "pod":"csi-node-driver-vfn6r", "timestamp":"2025-09-13 00:54:08.861904444 +0000 UTC"}, Hostname:"10.200.4.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.862 [INFO][2753] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.862 [INFO][2753] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.862 [INFO][2753] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.19' Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.868 [INFO][2753] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.872 [INFO][2753] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.876 [INFO][2753] ipam/ipam.go 511: Trying affinity for 192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.878 [INFO][2753] ipam/ipam.go 158: Attempting to load block cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.880 [INFO][2753] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.880 [INFO][2753] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.94.192/26 handle="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.881 [INFO][2753] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.885 [INFO][2753] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.94.192/26 handle="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:08.896 [INFO][2753] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.94.193/26] block=192.168.94.192/26 handle="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:09.149 [INFO][2753] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.94.193/26] handle="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" host="10.200.4.19" Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:09.149 [INFO][2753] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:09.186663 env[1412]: 2025-09-13 00:54:09.149 [INFO][2753] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.193/26] IPv6=[] ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" HandleID="k8s-pod-network.6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:09.187710 env[1412]: 2025-09-13 00:54:09.150 [INFO][2739] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-csi--node--driver--vfn6r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8df7239f-461c-4207-bddd-da329e7d0c91", ResourceVersion:"1416", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"", Pod:"csi-node-driver-vfn6r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali610c3bc2524", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:09.187710 env[1412]: 2025-09-13 00:54:09.150 [INFO][2739] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.94.193/32] ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:09.187710 env[1412]: 2025-09-13 00:54:09.150 [INFO][2739] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali610c3bc2524 ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:09.187710 env[1412]: 2025-09-13 00:54:09.169 [INFO][2739] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:09.187710 env[1412]: 2025-09-13 00:54:09.169 [INFO][2739] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-csi--node--driver--vfn6r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8df7239f-461c-4207-bddd-da329e7d0c91", ResourceVersion:"1416", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e", Pod:"csi-node-driver-vfn6r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali610c3bc2524", MAC:"26:de:1c:38:0b:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:09.187710 env[1412]: 2025-09-13 00:54:09.181 [INFO][2739] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e" Namespace="calico-system" Pod="csi-node-driver-vfn6r" WorkloadEndpoint="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:09.210005 env[1412]: time="2025-09-13T00:54:09.209803867Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:54:09.210005 env[1412]: time="2025-09-13T00:54:09.209856767Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:54:09.210005 env[1412]: time="2025-09-13T00:54:09.209872567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:54:09.210403 env[1412]: time="2025-09-13T00:54:09.210309567Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e pid=2791 runtime=io.containerd.runc.v2 Sep 13 00:54:09.233275 systemd[1]: Started cri-containerd-6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e.scope. Sep 13 00:54:09.268639 kernel: kauditd_printk_skb: 596 callbacks suppressed Sep 13 00:54:09.268760 kernel: audit: type=1400 audit(1757724849.245:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.287308 kernel: audit: type=1400 audit(1757724849.245:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.301542 kernel: audit: type=1400 audit(1757724849.246:653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.319287 env[1412]: time="2025-09-13T00:54:09.319247104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfn6r,Uid:8df7239f-461c-4207-bddd-da329e7d0c91,Namespace:calico-system,Attempt:1,} returns sandbox id \"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e\"" Sep 13 00:54:09.320971 env[1412]: time="2025-09-13T00:54:09.320948205Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:54:09.329135 kernel: audit: type=1400 audit(1757724849.246:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.329222 kernel: audit: type=1400 audit(1757724849.246:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.358174 kernel: audit: type=1400 audit(1757724849.246:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.358241 kernel: audit: type=1400 audit(1757724849.246:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.358274 kernel: audit: type=1400 audit(1757724849.246:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.384849 kernel: audit: type=1400 audit(1757724849.246:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.386151 kernel: audit: type=1400 audit(1757724849.246:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.246000 audit: BPF prog-id=104 op=LOAD Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2791 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343563636137623866323737623133653734356161306132313733 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2791 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343563636137623866323737623133653734356161306132313733 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit: BPF prog-id=105 op=LOAD Sep 13 00:54:09.268000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00018a4f0 items=0 ppid=2791 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343563636137623866323737623133653734356161306132313733 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit: BPF prog-id=106 op=LOAD Sep 13 00:54:09.268000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00018a538 items=0 ppid=2791 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343563636137623866323737623133653734356161306132313733 Sep 13 00:54:09.268000 audit: BPF prog-id=106 op=UNLOAD Sep 13 00:54:09.268000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.268000 audit: BPF prog-id=107 op=LOAD Sep 13 00:54:09.268000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00018a948 items=0 ppid=2791 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343563636137623866323737623133653734356161306132313733 Sep 13 00:54:09.237000 audit[2780]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:54:09.237000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffcf6a7e9b0 a2=0 a3=7ffcf6a7e99c items=0 ppid=2537 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:54:09.417977 systemd-networkd[1564]: caliec677e48278: Link UP Sep 13 00:54:09.425660 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec677e48278: link becomes ready Sep 13 00:54:09.425943 systemd-networkd[1564]: caliec677e48278: Gained carrier Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.215 [INFO][2761] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0 nginx-deployment-8587fbcb89- default 365dcef4-d0cb-473c-8763-c0672c3522b6 1422 0 2025-09-13 00:53:52 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.19 nginx-deployment-8587fbcb89-6tgps eth0 default [] [] [kns.default ksa.default.default] caliec677e48278 [] [] }} ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.215 [INFO][2761] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.275 [INFO][2821] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" HandleID="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.276 [INFO][2821] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" HandleID="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ccff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.19", "pod":"nginx-deployment-8587fbcb89-6tgps", "timestamp":"2025-09-13 00:54:09.27583679 +0000 UTC"}, Hostname:"10.200.4.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.276 [INFO][2821] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.276 [INFO][2821] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.276 [INFO][2821] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.19' Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.316 [INFO][2821] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.345 [INFO][2821] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.372 [INFO][2821] ipam/ipam.go 511: Trying affinity for 192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.386 [INFO][2821] ipam/ipam.go 158: Attempting to load block cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.389 [INFO][2821] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.389 [INFO][2821] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.94.192/26 handle="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.390 [INFO][2821] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3 Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.397 [INFO][2821] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.94.192/26 handle="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.412 [INFO][2821] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.94.194/26] block=192.168.94.192/26 handle="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.412 [INFO][2821] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.94.194/26] handle="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" host="10.200.4.19" Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.412 [INFO][2821] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:09.440973 env[1412]: 2025-09-13 00:54:09.412 [INFO][2821] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.194/26] IPv6=[] ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" HandleID="k8s-pod-network.e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:09.441783 env[1412]: 2025-09-13 00:54:09.414 [INFO][2761] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"365dcef4-d0cb-473c-8763-c0672c3522b6", ResourceVersion:"1422", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-6tgps", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliec677e48278", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:09.441783 env[1412]: 2025-09-13 00:54:09.414 [INFO][2761] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.94.194/32] ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:09.441783 env[1412]: 2025-09-13 00:54:09.414 [INFO][2761] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliec677e48278 ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:09.441783 env[1412]: 2025-09-13 00:54:09.426 [INFO][2761] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:09.441783 env[1412]: 2025-09-13 00:54:09.427 [INFO][2761] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"365dcef4-d0cb-473c-8763-c0672c3522b6", ResourceVersion:"1422", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3", Pod:"nginx-deployment-8587fbcb89-6tgps", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliec677e48278", MAC:"b6:c1:d4:f2:fd:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:09.441783 env[1412]: 2025-09-13 00:54:09.438 [INFO][2761] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3" Namespace="default" Pod="nginx-deployment-8587fbcb89-6tgps" WorkloadEndpoint="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:09.462000 audit[2851]: NETFILTER_CFG table=filter:77 family=2 entries=42 op=nft_register_chain pid=2851 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:54:09.462000 audit[2851]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fff79a4a440 a2=0 a3=7fff79a4a42c items=0 ppid=2537 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.462000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:54:09.548250 env[1412]: time="2025-09-13T00:54:09.548168883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:54:09.548250 env[1412]: time="2025-09-13T00:54:09.548217383Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:54:09.548478 env[1412]: time="2025-09-13T00:54:09.548232783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:54:09.548478 env[1412]: time="2025-09-13T00:54:09.548409183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3 pid=2860 runtime=io.containerd.runc.v2 Sep 13 00:54:09.561630 systemd[1]: Started cri-containerd-e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3.scope. Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.574000 audit: BPF prog-id=108 op=LOAD Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2860 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613766356562313433383761393262356133623531393763626365 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2860 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613766356562313433383761393262356133623531393763626365 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.575000 audit: BPF prog-id=109 op=LOAD Sep 13 00:54:09.575000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002cbdc0 items=0 ppid=2860 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613766356562313433383761393262356133623531393763626365 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit: BPF prog-id=110 op=LOAD Sep 13 00:54:09.576000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002cbe08 items=0 ppid=2860 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613766356562313433383761393262356133623531393763626365 Sep 13 00:54:09.576000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:54:09.576000 audit: BPF prog-id=109 op=UNLOAD Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:09.576000 audit: BPF prog-id=111 op=LOAD Sep 13 00:54:09.576000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c2218 items=0 ppid=2860 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:09.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613766356562313433383761393262356133623531393763626365 Sep 13 00:54:09.603863 env[1412]: time="2025-09-13T00:54:09.602899102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6tgps,Uid:365dcef4-d0cb-473c-8763-c0672c3522b6,Namespace:default,Attempt:1,} returns sandbox id \"e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3\"" Sep 13 00:54:09.934231 kubelet[1853]: E0913 00:54:09.934189 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:10.469385 systemd-networkd[1564]: cali610c3bc2524: Gained IPv6LL Sep 13 00:54:10.917254 systemd-networkd[1564]: caliec677e48278: Gained IPv6LL Sep 13 00:54:10.934364 kubelet[1853]: E0913 00:54:10.934335 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:11.935341 kubelet[1853]: E0913 00:54:11.935296 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:12.935628 kubelet[1853]: E0913 00:54:12.935592 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:13.201167 env[1412]: time="2025-09-13T00:54:13.200911500Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:13.250205 env[1412]: time="2025-09-13T00:54:13.250164213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:13.295991 env[1412]: time="2025-09-13T00:54:13.295952826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:13.343920 env[1412]: time="2025-09-13T00:54:13.343884138Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:13.344368 env[1412]: time="2025-09-13T00:54:13.344335538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:54:13.345940 env[1412]: time="2025-09-13T00:54:13.345911739Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:54:13.346644 env[1412]: time="2025-09-13T00:54:13.346618539Z" level=info msg="CreateContainer within sandbox \"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:54:13.935983 kubelet[1853]: E0913 00:54:13.935953 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:14.499570 env[1412]: time="2025-09-13T00:54:14.499521637Z" level=info msg="CreateContainer within sandbox \"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a35a1db60d6f2b035f357466489eccb8175154674f819913ddef3d184a1240b0\"" Sep 13 00:54:14.500528 env[1412]: time="2025-09-13T00:54:14.500495037Z" level=info msg="StartContainer for \"a35a1db60d6f2b035f357466489eccb8175154674f819913ddef3d184a1240b0\"" Sep 13 00:54:14.535192 systemd[1]: Started cri-containerd-a35a1db60d6f2b035f357466489eccb8175154674f819913ddef3d184a1240b0.scope. Sep 13 00:54:14.571245 kernel: kauditd_printk_skb: 110 callbacks suppressed Sep 13 00:54:14.593918 kernel: audit: type=1400 audit(1757724854.551:689): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.593997 kernel: audit: type=1300 audit(1757724854.551:689): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f0fc46fd9f8 items=0 ppid=2791 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f0fc46fd9f8 items=0 ppid=2791 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:14.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356131646236306436663262303335663335373436363438396563 Sep 13 00:54:14.613567 kernel: audit: type=1327 audit(1757724854.551:689): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356131646236306436663262303335663335373436363438396563 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.628149 kernel: audit: type=1400 audit(1757724854.551:690): avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.654878 kernel: audit: type=1400 audit(1757724854.551:690): avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.654959 kernel: audit: type=1400 audit(1757724854.551:690): avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.654982 kernel: audit: type=1400 audit(1757724854.551:690): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.681367 kernel: audit: type=1400 audit(1757724854.551:690): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.682172 kernel: audit: type=1400 audit(1757724854.551:690): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.708163 kernel: audit: type=1400 audit(1757724854.551:690): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.551000 audit: BPF prog-id=112 op=LOAD Sep 13 00:54:14.551000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000394d28 items=0 ppid=2791 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:14.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356131646236306436663262303335663335373436363438396563 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.570000 audit: BPF prog-id=113 op=LOAD Sep 13 00:54:14.570000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000394d78 items=0 ppid=2791 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:14.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356131646236306436663262303335663335373436363438396563 Sep 13 00:54:14.592000 audit: BPF prog-id=113 op=UNLOAD Sep 13 00:54:14.592000 audit: BPF prog-id=112 op=UNLOAD Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:14.592000 audit: BPF prog-id=114 op=LOAD Sep 13 00:54:14.592000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000394e08 items=0 ppid=2791 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356131646236306436663262303335663335373436363438396563 Sep 13 00:54:14.898095 env[1412]: time="2025-09-13T00:54:14.898047236Z" level=info msg="StartContainer for \"a35a1db60d6f2b035f357466489eccb8175154674f819913ddef3d184a1240b0\" returns successfully" Sep 13 00:54:14.936433 kubelet[1853]: E0913 00:54:14.936397 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:14.993468 systemd[1]: run-containerd-runc-k8s.io-a35a1db60d6f2b035f357466489eccb8175154674f819913ddef3d184a1240b0-runc.l6Ia9b.mount: Deactivated successfully. Sep 13 00:54:15.936751 kubelet[1853]: E0913 00:54:15.936718 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:16.896890 systemd[1]: run-containerd-runc-k8s.io-db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6-runc.J4Yw8n.mount: Deactivated successfully. Sep 13 00:54:16.912288 kubelet[1853]: E0913 00:54:16.912251 1853 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:16.937861 kubelet[1853]: E0913 00:54:16.937827 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:17.648442 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount572216180.mount: Deactivated successfully. Sep 13 00:54:17.938774 kubelet[1853]: E0913 00:54:17.938389 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:18.939420 kubelet[1853]: E0913 00:54:18.939355 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:19.385342 env[1412]: time="2025-09-13T00:54:19.385290325Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:19.395366 env[1412]: time="2025-09-13T00:54:19.395325126Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:19.401369 env[1412]: time="2025-09-13T00:54:19.401338586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:19.405150 env[1412]: time="2025-09-13T00:54:19.405106424Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:19.405803 env[1412]: time="2025-09-13T00:54:19.405764531Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:54:19.407864 env[1412]: time="2025-09-13T00:54:19.407547749Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:54:19.408189 env[1412]: time="2025-09-13T00:54:19.408158455Z" level=info msg="CreateContainer within sandbox \"e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 00:54:19.432869 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1430816490.mount: Deactivated successfully. Sep 13 00:54:19.445704 env[1412]: time="2025-09-13T00:54:19.445663531Z" level=info msg="CreateContainer within sandbox \"e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"481c5645ad976e42dd053b17d57a7f4a3700f8fb3949d1225fe2308caf0376c4\"" Sep 13 00:54:19.446416 env[1412]: time="2025-09-13T00:54:19.446386038Z" level=info msg="StartContainer for \"481c5645ad976e42dd053b17d57a7f4a3700f8fb3949d1225fe2308caf0376c4\"" Sep 13 00:54:19.470381 systemd[1]: Started cri-containerd-481c5645ad976e42dd053b17d57a7f4a3700f8fb3949d1225fe2308caf0376c4.scope. Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.487000 audit: BPF prog-id=115 op=LOAD Sep 13 00:54:19.487000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.487000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2860 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:19.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316335363435616439373665343264643035336231376435376137 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2860 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:19.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316335363435616439373665343264643035336231376435376137 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit: BPF prog-id=116 op=LOAD Sep 13 00:54:19.488000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af390 items=0 ppid=2860 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:19.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316335363435616439373665343264643035336231376435376137 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.488000 audit: BPF prog-id=117 op=LOAD Sep 13 00:54:19.488000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001af3d8 items=0 ppid=2860 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:19.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316335363435616439373665343264643035336231376435376137 Sep 13 00:54:19.489000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:54:19.489000 audit: BPF prog-id=116 op=UNLOAD Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:19.489000 audit: BPF prog-id=118 op=LOAD Sep 13 00:54:19.489000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001af7e8 items=0 ppid=2860 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316335363435616439373665343264643035336231376435376137 Sep 13 00:54:19.511362 env[1412]: time="2025-09-13T00:54:19.511333191Z" level=info msg="StartContainer for \"481c5645ad976e42dd053b17d57a7f4a3700f8fb3949d1225fe2308caf0376c4\" returns successfully" Sep 13 00:54:19.939504 kubelet[1853]: E0913 00:54:19.939471 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:20.429440 systemd[1]: run-containerd-runc-k8s.io-481c5645ad976e42dd053b17d57a7f4a3700f8fb3949d1225fe2308caf0376c4-runc.JfNdLf.mount: Deactivated successfully. Sep 13 00:54:20.940331 kubelet[1853]: E0913 00:54:20.940294 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:21.019311 env[1412]: time="2025-09-13T00:54:21.019265244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:21.027171 env[1412]: time="2025-09-13T00:54:21.027138619Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:21.030896 env[1412]: time="2025-09-13T00:54:21.030865754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:21.035515 env[1412]: time="2025-09-13T00:54:21.035485698Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:21.035873 env[1412]: time="2025-09-13T00:54:21.035843501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:54:21.038036 env[1412]: time="2025-09-13T00:54:21.038008322Z" level=info msg="CreateContainer within sandbox \"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:54:21.066732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1530149163.mount: Deactivated successfully. Sep 13 00:54:21.079029 env[1412]: time="2025-09-13T00:54:21.078994511Z" level=info msg="CreateContainer within sandbox \"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6ce6e498e84ff7691af952e9e849fbd90d2681c606eb34fc815824592ac7d37b\"" Sep 13 00:54:21.079726 env[1412]: time="2025-09-13T00:54:21.079699318Z" level=info msg="StartContainer for \"6ce6e498e84ff7691af952e9e849fbd90d2681c606eb34fc815824592ac7d37b\"" Sep 13 00:54:21.104231 systemd[1]: Started cri-containerd-6ce6e498e84ff7691af952e9e849fbd90d2681c606eb34fc815824592ac7d37b.scope. Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.122427 kernel: kauditd_printk_skb: 90 callbacks suppressed Sep 13 00:54:21.122504 kernel: audit: type=1400 audit(1757724861.116:713): avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4d29fa2038 items=0 ppid=2791 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:21.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653665343938653834666637363931616639353265396538343966 Sep 13 00:54:21.178624 kernel: audit: type=1300 audit(1757724861.116:713): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4d29fa2038 items=0 ppid=2791 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:21.178705 kernel: audit: type=1327 audit(1757724861.116:713): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653665343938653834666637363931616639353265396538343966 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.199404 env[1412]: time="2025-09-13T00:54:21.198568747Z" level=info msg="StartContainer for \"6ce6e498e84ff7691af952e9e849fbd90d2681c606eb34fc815824592ac7d37b\" returns successfully" Sep 13 00:54:21.211871 kernel: audit: type=1400 audit(1757724861.116:714): avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.211951 kernel: audit: type=1400 audit(1757724861.116:714): avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.211980 kernel: audit: type=1400 audit(1757724861.116:714): avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.225157 kernel: audit: type=1400 audit(1757724861.116:714): avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.251717 kernel: audit: type=1400 audit(1757724861.116:714): avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.251780 kernel: audit: type=1400 audit(1757724861.116:714): avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.278650 kernel: audit: type=1400 audit(1757724861.116:714): avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.116000 audit: BPF prog-id=119 op=LOAD Sep 13 00:54:21.116000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d9ec8 items=0 ppid=2791 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:21.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653665343938653834666637363931616639353265396538343966 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit: BPF prog-id=120 op=LOAD Sep 13 00:54:21.135000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002d9f18 items=0 ppid=2791 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:21.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653665343938653834666637363931616639353265396538343966 Sep 13 00:54:21.135000 audit: BPF prog-id=120 op=UNLOAD Sep 13 00:54:21.135000 audit: BPF prog-id=119 op=UNLOAD Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:21.135000 audit: BPF prog-id=121 op=LOAD Sep 13 00:54:21.135000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002d9fa8 items=0 ppid=2791 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:21.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653665343938653834666637363931616639353265396538343966 Sep 13 00:54:21.941440 kubelet[1853]: E0913 00:54:21.941406 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:22.041961 kubelet[1853]: I0913 00:54:22.041926 1853 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:54:22.041961 kubelet[1853]: I0913 00:54:22.041964 1853 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:54:22.090364 kubelet[1853]: I0913 00:54:22.090310 1853 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-vfn6r" podStartSLOduration=33.373934487 podStartE2EDuration="45.090298792s" podCreationTimestamp="2025-09-13 00:53:37 +0000 UTC" firstStartedPulling="2025-09-13 00:54:09.320454505 +0000 UTC m=+33.659843566" lastFinishedPulling="2025-09-13 00:54:21.03681871 +0000 UTC m=+45.376207871" observedRunningTime="2025-09-13 00:54:22.089644686 +0000 UTC m=+46.429033847" watchObservedRunningTime="2025-09-13 00:54:22.090298792 +0000 UTC m=+46.429687953" Sep 13 00:54:22.090576 kubelet[1853]: I0913 00:54:22.090445 1853 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-6tgps" podStartSLOduration=20.287691752 podStartE2EDuration="30.090436893s" podCreationTimestamp="2025-09-13 00:53:52 +0000 UTC" firstStartedPulling="2025-09-13 00:54:09.604240602 +0000 UTC m=+33.943629663" lastFinishedPulling="2025-09-13 00:54:19.406985643 +0000 UTC m=+43.746374804" observedRunningTime="2025-09-13 00:54:20.083741914 +0000 UTC m=+44.423131075" watchObservedRunningTime="2025-09-13 00:54:22.090436893 +0000 UTC m=+46.429826054" Sep 13 00:54:22.942271 kubelet[1853]: E0913 00:54:22.942233 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:23.942917 kubelet[1853]: E0913 00:54:23.942882 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:24.943171 kubelet[1853]: E0913 00:54:24.943117 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:25.943586 kubelet[1853]: E0913 00:54:25.943554 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:26.943847 kubelet[1853]: E0913 00:54:26.943810 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:27.944070 kubelet[1853]: E0913 00:54:27.944036 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:28.945005 kubelet[1853]: E0913 00:54:28.944965 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:29.092000 audit[3074]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.098511 kernel: kauditd_printk_skb: 33 callbacks suppressed Sep 13 00:54:29.098657 kernel: audit: type=1325 audit(1757724869.092:719): table=filter:78 family=2 entries=20 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.092000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcddd4fab0 a2=0 a3=7ffcddd4fa9c items=0 ppid=2066 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.130495 kernel: audit: type=1300 audit(1757724869.092:719): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcddd4fab0 a2=0 a3=7ffcddd4fa9c items=0 ppid=2066 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.141268 kernel: audit: type=1327 audit(1757724869.092:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.141345 kernel: audit: type=1325 audit(1757724869.129:720): table=nat:79 family=2 entries=26 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.129000 audit[3074]: NETFILTER_CFG table=nat:79 family=2 entries=26 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.154158 kernel: audit: type=1300 audit(1757724869.129:720): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffcddd4fab0 a2=0 a3=0 items=0 ppid=2066 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.129000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffcddd4fab0 a2=0 a3=0 items=0 ppid=2066 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.168258 systemd[1]: Created slice kubepods-besteffort-pod32c34e70_d1e8_486b_8b73_eb7b7b532678.slice. Sep 13 00:54:29.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.175185 kernel: audit: type=1327 audit(1757724869.129:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.191000 audit[3078]: NETFILTER_CFG table=filter:80 family=2 entries=32 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.206153 kernel: audit: type=1325 audit(1757724869.191:721): table=filter:80 family=2 entries=32 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.206233 kernel: audit: type=1300 audit(1757724869.191:721): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff5ac0c790 a2=0 a3=7fff5ac0c77c items=0 ppid=2066 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.191000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff5ac0c790 a2=0 a3=7fff5ac0c77c items=0 ppid=2066 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.226963 kernel: audit: type=1327 audit(1757724869.191:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.225000 audit[3078]: NETFILTER_CFG table=nat:81 family=2 entries=26 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.247289 kernel: audit: type=1325 audit(1757724869.225:722): table=nat:81 family=2 entries=26 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:29.225000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff5ac0c790 a2=0 a3=0 items=0 ppid=2066 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:29.248555 kubelet[1853]: I0913 00:54:29.248528 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v5p52\" (UniqueName: \"kubernetes.io/projected/32c34e70-d1e8-486b-8b73-eb7b7b532678-kube-api-access-v5p52\") pod \"nfs-server-provisioner-0\" (UID: \"32c34e70-d1e8-486b-8b73-eb7b7b532678\") " pod="default/nfs-server-provisioner-0" Sep 13 00:54:29.248702 kubelet[1853]: I0913 00:54:29.248672 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/32c34e70-d1e8-486b-8b73-eb7b7b532678-data\") pod \"nfs-server-provisioner-0\" (UID: \"32c34e70-d1e8-486b-8b73-eb7b7b532678\") " pod="default/nfs-server-provisioner-0" Sep 13 00:54:29.472084 env[1412]: time="2025-09-13T00:54:29.471983729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:32c34e70-d1e8-486b-8b73-eb7b7b532678,Namespace:default,Attempt:0,}" Sep 13 00:54:29.667667 systemd-networkd[1564]: cali60e51b789ff: Link UP Sep 13 00:54:29.674332 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:54:29.674410 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 00:54:29.674677 systemd-networkd[1564]: cali60e51b789ff: Gained carrier Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.568 [INFO][3082] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.19-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 32c34e70-d1e8-486b-8b73-eb7b7b532678 1516 0 2025-09-13 00:54:29 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.4.19 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.568 [INFO][3082] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.593 [INFO][3094] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" HandleID="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Workload="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.593 [INFO][3094] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" HandleID="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Workload="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9250), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.19", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 00:54:29.593546158 +0000 UTC"}, Hostname:"10.200.4.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.593 [INFO][3094] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.593 [INFO][3094] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.593 [INFO][3094] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.19' Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.630 [INFO][3094] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.637 [INFO][3094] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.641 [INFO][3094] ipam/ipam.go 511: Trying affinity for 192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.643 [INFO][3094] ipam/ipam.go 158: Attempting to load block cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.645 [INFO][3094] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.645 [INFO][3094] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.94.192/26 handle="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.646 [INFO][3094] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821 Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.650 [INFO][3094] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.94.192/26 handle="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.659 [INFO][3094] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.94.195/26] block=192.168.94.192/26 handle="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.660 [INFO][3094] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.94.195/26] handle="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" host="10.200.4.19" Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.660 [INFO][3094] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:29.687709 env[1412]: 2025-09-13 00:54:29.660 [INFO][3094] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.195/26] IPv6=[] ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" HandleID="k8s-pod-network.822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Workload="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:54:29.688589 env[1412]: 2025-09-13 00:54:29.661 [INFO][3082] cni-plugin/k8s.go 418: Populated endpoint ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"32c34e70-d1e8-486b-8b73-eb7b7b532678", ResourceVersion:"1516", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.94.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:29.688589 env[1412]: 2025-09-13 00:54:29.661 [INFO][3082] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.94.195/32] ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:54:29.688589 env[1412]: 2025-09-13 00:54:29.661 [INFO][3082] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:54:29.688589 env[1412]: 2025-09-13 00:54:29.675 [INFO][3082] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:54:29.688831 env[1412]: 2025-09-13 00:54:29.676 [INFO][3082] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"32c34e70-d1e8-486b-8b73-eb7b7b532678", ResourceVersion:"1516", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 54, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.94.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ca:9f:f5:58:eb:0f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:29.688831 env[1412]: 2025-09-13 00:54:29.686 [INFO][3082] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.19-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:54:29.702815 env[1412]: time="2025-09-13T00:54:29.702742892Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:54:29.702918 env[1412]: time="2025-09-13T00:54:29.702830293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:54:29.702918 env[1412]: time="2025-09-13T00:54:29.702858993Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:54:29.703045 env[1412]: time="2025-09-13T00:54:29.703006894Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821 pid=3116 runtime=io.containerd.runc.v2 Sep 13 00:54:29.712000 audit[3123]: NETFILTER_CFG table=filter:82 family=2 entries=46 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:54:29.712000 audit[3123]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7ffe0e10f260 a2=0 a3=7ffe0e10f24c items=0 ppid=2537 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.712000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:54:29.732204 systemd[1]: Started cri-containerd-822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821.scope. Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.743000 audit: BPF prog-id=122 op=LOAD Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3116 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326432633039303336623765366233336262323734386434396363 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3116 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326432633039303336623765366233336262323734386434396363 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.744000 audit: BPF prog-id=123 op=LOAD Sep 13 00:54:29.744000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e8a10 items=0 ppid=3116 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326432633039303336623765366233336262323734386434396363 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.745000 audit: BPF prog-id=124 op=LOAD Sep 13 00:54:29.745000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002e8a58 items=0 ppid=3116 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326432633039303336623765366233336262323734386434396363 Sep 13 00:54:29.746000 audit: BPF prog-id=124 op=UNLOAD Sep 13 00:54:29.746000 audit: BPF prog-id=123 op=UNLOAD Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:29.746000 audit: BPF prog-id=125 op=LOAD Sep 13 00:54:29.746000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002e8e68 items=0 ppid=3116 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:29.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326432633039303336623765366233336262323734386434396363 Sep 13 00:54:29.773311 env[1412]: time="2025-09-13T00:54:29.773267831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:32c34e70-d1e8-486b-8b73-eb7b7b532678,Namespace:default,Attempt:0,} returns sandbox id \"822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821\"" Sep 13 00:54:29.775217 env[1412]: time="2025-09-13T00:54:29.775195345Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 00:54:29.945789 kubelet[1853]: E0913 00:54:29.945737 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:30.361368 systemd[1]: run-containerd-runc-k8s.io-822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821-runc.F6rwrg.mount: Deactivated successfully. Sep 13 00:54:30.945870 kubelet[1853]: E0913 00:54:30.945830 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:31.269680 systemd-networkd[1564]: cali60e51b789ff: Gained IPv6LL Sep 13 00:54:31.946419 kubelet[1853]: E0913 00:54:31.946383 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:32.947459 kubelet[1853]: E0913 00:54:32.947424 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:33.948415 kubelet[1853]: E0913 00:54:33.948378 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:34.948847 kubelet[1853]: E0913 00:54:34.948808 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:35.950028 kubelet[1853]: E0913 00:54:35.949964 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:36.351230 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2366511943.mount: Deactivated successfully. Sep 13 00:54:36.911364 kubelet[1853]: E0913 00:54:36.911328 1853 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:36.950808 kubelet[1853]: E0913 00:54:36.950778 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:37.095839 env[1412]: time="2025-09-13T00:54:36.970107961Z" level=info msg="StopPodSandbox for \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\"" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.003 [WARNING][3163] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-csi--node--driver--vfn6r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8df7239f-461c-4207-bddd-da329e7d0c91", ResourceVersion:"1481", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e", Pod:"csi-node-driver-vfn6r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali610c3bc2524", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.003 [INFO][3163] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.003 [INFO][3163] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" iface="eth0" netns="" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.003 [INFO][3163] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.004 [INFO][3163] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.028 [INFO][3171] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.028 [INFO][3171] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.028 [INFO][3171] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.035 [WARNING][3171] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.035 [INFO][3171] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.036 [INFO][3171] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:37.095839 env[1412]: 2025-09-13 00:54:37.037 [INFO][3163] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.095839 env[1412]: time="2025-09-13T00:54:37.038117988Z" level=info msg="TearDown network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\" successfully" Sep 13 00:54:37.095839 env[1412]: time="2025-09-13T00:54:37.038168788Z" level=info msg="StopPodSandbox for \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\" returns successfully" Sep 13 00:54:37.095839 env[1412]: time="2025-09-13T00:54:37.038501390Z" level=info msg="RemovePodSandbox for \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\"" Sep 13 00:54:37.095839 env[1412]: time="2025-09-13T00:54:37.038534090Z" level=info msg="Forcibly stopping sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\"" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.070 [WARNING][3185] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-csi--node--driver--vfn6r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8df7239f-461c-4207-bddd-da329e7d0c91", ResourceVersion:"1481", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"6e45cca7b8f277b13e745aa0a2173eb2177f567320bb7894bd6e4690e7ef1f8e", Pod:"csi-node-driver-vfn6r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali610c3bc2524", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.070 [INFO][3185] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.070 [INFO][3185] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" iface="eth0" netns="" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.070 [INFO][3185] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.070 [INFO][3185] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.097 [INFO][3192] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.097 [INFO][3192] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.097 [INFO][3192] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.104 [WARNING][3192] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.105 [INFO][3192] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" HandleID="k8s-pod-network.1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Workload="10.200.4.19-k8s-csi--node--driver--vfn6r-eth0" Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.106 [INFO][3192] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:37.107909 env[1412]: 2025-09-13 00:54:37.106 [INFO][3185] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba" Sep 13 00:54:37.108485 env[1412]: time="2025-09-13T00:54:37.107990821Z" level=info msg="TearDown network for sandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\" successfully" Sep 13 00:54:37.951787 kubelet[1853]: E0913 00:54:37.951744 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:38.952557 kubelet[1853]: E0913 00:54:38.952518 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:39.953407 kubelet[1853]: E0913 00:54:39.953370 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:40.953633 kubelet[1853]: E0913 00:54:40.953594 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:41.954076 kubelet[1853]: E0913 00:54:41.954038 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:42.954808 kubelet[1853]: E0913 00:54:42.954770 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:43.955447 kubelet[1853]: E0913 00:54:43.955407 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:44.955797 kubelet[1853]: E0913 00:54:44.955762 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:45.749556 env[1412]: time="2025-09-13T00:54:45.749489142Z" level=info msg="RemovePodSandbox \"1b68ce091f374c084f87ca19d1d1502d46d82b3edf8f613f9ab9b71474ebfbba\" returns successfully" Sep 13 00:54:45.750425 env[1412]: time="2025-09-13T00:54:45.750396146Z" level=info msg="StopPodSandbox for \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\"" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.791 [WARNING][3217] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"365dcef4-d0cb-473c-8763-c0672c3522b6", ResourceVersion:"1469", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3", Pod:"nginx-deployment-8587fbcb89-6tgps", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliec677e48278", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.792 [INFO][3217] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.792 [INFO][3217] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" iface="eth0" netns="" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.792 [INFO][3217] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.792 [INFO][3217] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.814 [INFO][3224] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.814 [INFO][3224] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.814 [INFO][3224] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.828 [WARNING][3224] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.828 [INFO][3224] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.829 [INFO][3224] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:45.831715 env[1412]: 2025-09-13 00:54:45.830 [INFO][3217] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.832388 env[1412]: time="2025-09-13T00:54:45.831737759Z" level=info msg="TearDown network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\" successfully" Sep 13 00:54:45.832388 env[1412]: time="2025-09-13T00:54:45.831775259Z" level=info msg="StopPodSandbox for \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\" returns successfully" Sep 13 00:54:45.832388 env[1412]: time="2025-09-13T00:54:45.832228662Z" level=info msg="RemovePodSandbox for \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\"" Sep 13 00:54:45.832388 env[1412]: time="2025-09-13T00:54:45.832269162Z" level=info msg="Forcibly stopping sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\"" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.877 [WARNING][3239] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"365dcef4-d0cb-473c-8763-c0672c3522b6", ResourceVersion:"1469", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"e4a7f5eb14387a92b5a3b5197cbce0dc7fdd1c5324bccbeb06b867f40045f1f3", Pod:"nginx-deployment-8587fbcb89-6tgps", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliec677e48278", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.877 [INFO][3239] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.877 [INFO][3239] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" iface="eth0" netns="" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.877 [INFO][3239] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.877 [INFO][3239] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.895 [INFO][3246] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.895 [INFO][3246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.895 [INFO][3246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.902 [WARNING][3246] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.902 [INFO][3246] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" HandleID="k8s-pod-network.e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Workload="10.200.4.19-k8s-nginx--deployment--8587fbcb89--6tgps-eth0" Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.903 [INFO][3246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:54:45.905473 env[1412]: 2025-09-13 00:54:45.904 [INFO][3239] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16" Sep 13 00:54:45.906105 env[1412]: time="2025-09-13T00:54:45.905471434Z" level=info msg="TearDown network for sandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\" successfully" Sep 13 00:54:45.956441 kubelet[1853]: E0913 00:54:45.956392 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:46.885113 systemd[1]: run-containerd-runc-k8s.io-db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6-runc.mId36F.mount: Deactivated successfully. Sep 13 00:54:46.957147 kubelet[1853]: E0913 00:54:46.957092 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:47.958114 kubelet[1853]: E0913 00:54:47.958072 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:48.958230 kubelet[1853]: E0913 00:54:48.958194 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:49.958496 kubelet[1853]: E0913 00:54:49.958457 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:50.447278 env[1412]: time="2025-09-13T00:54:50.447223980Z" level=info msg="RemovePodSandbox \"e0887c528413d8f5d52e0db5a6744227c00677b7e88dc626fa633348f7de5b16\" returns successfully" Sep 13 00:54:50.958715 kubelet[1853]: E0913 00:54:50.958661 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:51.070442 env[1412]: time="2025-09-13T00:54:51.070394884Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:51.076376 env[1412]: time="2025-09-13T00:54:51.076340011Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:51.080945 env[1412]: time="2025-09-13T00:54:51.080914731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:51.085808 env[1412]: time="2025-09-13T00:54:51.085776652Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:54:51.086332 env[1412]: time="2025-09-13T00:54:51.086304354Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 13 00:54:51.088770 env[1412]: time="2025-09-13T00:54:51.088743265Z" level=info msg="CreateContainer within sandbox \"822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 00:54:51.125222 env[1412]: time="2025-09-13T00:54:51.125186826Z" level=info msg="CreateContainer within sandbox \"822d2c09036b7e6b33bb2748d49cc52713c786d5ee9ff0377eab3fe77fc5f821\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"2ed6ed099d019fd1facbe7ee32e9e50bd981b1bbc0380dffff19d876fb3b3d01\"" Sep 13 00:54:51.125741 env[1412]: time="2025-09-13T00:54:51.125714228Z" level=info msg="StartContainer for \"2ed6ed099d019fd1facbe7ee32e9e50bd981b1bbc0380dffff19d876fb3b3d01\"" Sep 13 00:54:51.152327 systemd[1]: Started cri-containerd-2ed6ed099d019fd1facbe7ee32e9e50bd981b1bbc0380dffff19d876fb3b3d01.scope. Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.168680 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 13 00:54:51.168775 kernel: audit: type=1400 audit(1757724891.163:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.212135 kernel: audit: type=1400 audit(1757724891.163:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.212224 kernel: audit: type=1400 audit(1757724891.163:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.225600 kernel: audit: type=1400 audit(1757724891.163:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.230156 kernel: audit: type=1400 audit(1757724891.163:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.239308 kernel: audit: type=1400 audit(1757724891.163:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.272146 kernel: audit: type=1400 audit(1757724891.163:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.272228 kernel: audit: type=1400 audit(1757724891.163:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.286416 env[1412]: time="2025-09-13T00:54:51.286385237Z" level=info msg="StartContainer for \"2ed6ed099d019fd1facbe7ee32e9e50bd981b1bbc0380dffff19d876fb3b3d01\" returns successfully" Sep 13 00:54:51.301026 kernel: audit: type=1400 audit(1757724891.163:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit: BPF prog-id=126 op=LOAD Sep 13 00:54:51.317192 kernel: audit: type=1400 audit(1757724891.163:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3116 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:51.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265643665643039396430313966643166616362653765653332653965 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3116 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:51.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265643665643039396430313966643166616362653765653332653965 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.163000 audit: BPF prog-id=127 op=LOAD Sep 13 00:54:51.163000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00020ba70 items=0 ppid=3116 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:51.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265643665643039396430313966643166616362653765653332653965 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit: BPF prog-id=128 op=LOAD Sep 13 00:54:51.182000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003debf8 items=0 ppid=3116 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:51.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265643665643039396430313966643166616362653765653332653965 Sep 13 00:54:51.182000 audit: BPF prog-id=128 op=UNLOAD Sep 13 00:54:51.182000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:51.182000 audit: BPF prog-id=129 op=LOAD Sep 13 00:54:51.182000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003df008 items=0 ppid=3116 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:51.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265643665643039396430313966643166616362653765653332653965 Sep 13 00:54:51.324000 audit[3308]: AVC avc: denied { search } for pid=3308 comm="rpcbind" name="crypto" dev="proc" ino=26555 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:54:51.324000 audit[3308]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5b38c990c0 a2=0 a3=0 items=0 ppid=3291 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 key=(null) Sep 13 00:54:51.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 00:54:51.358000 audit[3313]: AVC avc: denied { search } for pid=3313 comm="dbus-daemon" name="crypto" dev="proc" ino=26555 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:54:51.358000 audit[3313]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f590ddf80c0 a2=0 a3=0 items=0 ppid=3291 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 key=(null) Sep 13 00:54:51.358000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:54:51.360000 audit[3314]: AVC avc: denied { watch } for pid=3314 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537451 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c117,c895 tclass=dir permissive=0 Sep 13 00:54:51.360000 audit[3314]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5608c3d74ca0 a2=2c8 a3=7ffc3c028bec items=0 ppid=3291 pid=3314 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 key=(null) Sep 13 00:54:51.360000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:54:51.365000 audit[3315]: AVC avc: denied { read } for pid=3315 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26591 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 00:54:51.365000 audit[3315]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fc352f8e320 a1=80000 a2=d a3=7ffdf36e98e0 items=0 ppid=3291 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 key=(null) Sep 13 00:54:51.365000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:54:51.365000 audit[3315]: AVC avc: denied { search } for pid=3315 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26555 scontext=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:54:51.365000 audit[3315]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc3524e20c0 a2=0 a3=0 items=0 ppid=3291 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c117,c895 key=(null) Sep 13 00:54:51.365000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:54:51.959026 kubelet[1853]: E0913 00:54:51.958990 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:52.154313 kubelet[1853]: I0913 00:54:52.154267 1853 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.8414888299999999 podStartE2EDuration="23.154254448s" podCreationTimestamp="2025-09-13 00:54:29 +0000 UTC" firstStartedPulling="2025-09-13 00:54:29.774702842 +0000 UTC m=+54.114091903" lastFinishedPulling="2025-09-13 00:54:51.08746846 +0000 UTC m=+75.426857521" observedRunningTime="2025-09-13 00:54:52.154007347 +0000 UTC m=+76.493396408" watchObservedRunningTime="2025-09-13 00:54:52.154254448 +0000 UTC m=+76.493643509" Sep 13 00:54:52.170000 audit[3320]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:52.170000 audit[3320]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcd9199a60 a2=0 a3=7ffcd9199a4c items=0 ppid=2066 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:52.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:52.178000 audit[3320]: NETFILTER_CFG table=nat:84 family=2 entries=110 op=nft_register_chain pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:54:52.178000 audit[3320]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffcd9199a60 a2=0 a3=7ffcd9199a4c items=0 ppid=2066 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:52.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:54:52.959841 kubelet[1853]: E0913 00:54:52.959802 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:53.960037 kubelet[1853]: E0913 00:54:53.959998 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:54.960150 kubelet[1853]: E0913 00:54:54.960107 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:55.960637 kubelet[1853]: E0913 00:54:55.960592 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:56.911440 kubelet[1853]: E0913 00:54:56.911403 1853 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:56.960866 kubelet[1853]: E0913 00:54:56.960844 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:57.961229 kubelet[1853]: E0913 00:54:57.961187 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:58.961581 kubelet[1853]: E0913 00:54:58.961545 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:54:59.962505 kubelet[1853]: E0913 00:54:59.962470 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:00.963221 kubelet[1853]: E0913 00:55:00.963184 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:01.963424 kubelet[1853]: E0913 00:55:01.963387 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:02.964052 kubelet[1853]: E0913 00:55:02.964018 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:03.965507 kubelet[1853]: E0913 00:55:03.965473 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:04.966350 kubelet[1853]: E0913 00:55:04.966323 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:05.966550 kubelet[1853]: E0913 00:55:05.966516 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:06.966806 kubelet[1853]: E0913 00:55:06.966779 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:07.967824 kubelet[1853]: E0913 00:55:07.967782 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:08.968012 kubelet[1853]: E0913 00:55:08.967983 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:09.968843 kubelet[1853]: E0913 00:55:09.968807 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:10.969892 kubelet[1853]: E0913 00:55:10.969858 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:11.970424 kubelet[1853]: E0913 00:55:11.970389 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:12.971031 kubelet[1853]: E0913 00:55:12.970999 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:13.971100 kubelet[1853]: E0913 00:55:13.971066 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:14.971585 kubelet[1853]: E0913 00:55:14.971556 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:15.972450 kubelet[1853]: E0913 00:55:15.972408 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:16.244296 systemd[1]: Created slice kubepods-besteffort-podc536bf67_925a_40ee_8d77_deafcd5645ca.slice. Sep 13 00:55:16.269258 kubelet[1853]: I0913 00:55:16.269231 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0fed413d-397f-46ef-990d-d0b1ddeb92cc\" (UniqueName: \"kubernetes.io/nfs/c536bf67-925a-40ee-8d77-deafcd5645ca-pvc-0fed413d-397f-46ef-990d-d0b1ddeb92cc\") pod \"test-pod-1\" (UID: \"c536bf67-925a-40ee-8d77-deafcd5645ca\") " pod="default/test-pod-1" Sep 13 00:55:16.269468 kubelet[1853]: I0913 00:55:16.269448 1853 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vkgdt\" (UniqueName: \"kubernetes.io/projected/c536bf67-925a-40ee-8d77-deafcd5645ca-kube-api-access-vkgdt\") pod \"test-pod-1\" (UID: \"c536bf67-925a-40ee-8d77-deafcd5645ca\") " pod="default/test-pod-1" Sep 13 00:55:16.422416 kernel: Failed to create system directory netfs Sep 13 00:55:16.422547 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 00:55:16.422594 kernel: audit: type=1400 audit(1757724916.416:767): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.416000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.445024 kernel: Failed to create system directory netfs Sep 13 00:55:16.445126 kernel: audit: type=1400 audit(1757724916.416:767): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.416000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.467306 kernel: Failed to create system directory netfs Sep 13 00:55:16.467407 kernel: audit: type=1400 audit(1757724916.416:767): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.416000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.489160 kernel: Failed to create system directory netfs Sep 13 00:55:16.489249 kernel: audit: type=1400 audit(1757724916.416:767): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.416000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.416000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558bc274e5e0 a1=153bc a2=558b8ae852b0 a3=5 items=0 ppid=2027 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:16.416000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:55:16.537578 kernel: audit: type=1300 audit(1757724916.416:767): arch=c000003e syscall=175 success=yes exit=0 a0=558bc274e5e0 a1=153bc a2=558b8ae852b0 a3=5 items=0 ppid=2027 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:16.537715 kernel: audit: type=1327 audit(1757724916.416:767): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.569195 kernel: Failed to create system directory fscache Sep 13 00:55:16.569282 kernel: audit: type=1400 audit(1757724916.540:768): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.569307 kernel: Failed to create system directory fscache Sep 13 00:55:16.569327 kernel: audit: type=1400 audit(1757724916.540:768): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.590224 kernel: Failed to create system directory fscache Sep 13 00:55:16.590294 kernel: audit: type=1400 audit(1757724916.540:768): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.611477 kernel: Failed to create system directory fscache Sep 13 00:55:16.611543 kernel: audit: type=1400 audit(1757724916.540:768): avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.628537 kernel: Failed to create system directory fscache Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.636241 kernel: Failed to create system directory fscache Sep 13 00:55:16.636306 kernel: Failed to create system directory fscache Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.643921 kernel: Failed to create system directory fscache Sep 13 00:55:16.643967 kernel: Failed to create system directory fscache Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.648148 kernel: Failed to create system directory fscache Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.654861 kernel: Failed to create system directory fscache Sep 13 00:55:16.654923 kernel: Failed to create system directory fscache Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.662163 kernel: Failed to create system directory fscache Sep 13 00:55:16.540000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.663147 kernel: Failed to create system directory fscache Sep 13 00:55:16.540000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558bc29639c0 a1=4c0fc a2=558b8ae852b0 a3=5 items=0 ppid=2027 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:16.670156 kernel: FS-Cache: Loaded Sep 13 00:55:16.540000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.714163 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.721370 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.721424 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.721448 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.728296 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.728350 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.735156 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.735206 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.741741 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.741787 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.748854 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.748904 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.755809 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.755865 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.762589 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.762659 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.766360 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.775775 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.775823 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.775854 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.782174 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.782243 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.788450 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.791581 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.791636 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.798709 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.798757 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.804450 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.804507 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.810315 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.810367 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.815966 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.816013 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.823898 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.823951 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.825678 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.830048 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.830079 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.835431 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.835472 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.839150 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.843764 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.843817 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.849571 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.849635 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.855828 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.855902 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.867628 systemd[1]: run-containerd-runc-k8s.io-db18e8128de2d504187280051d33c360f7a96edcee82283e32afed9e2ab1fad6-runc.EVRBX6.mount: Deactivated successfully. Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.873783 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.878217 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.884734 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.884798 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.887891 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.893750 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.893814 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.893842 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.899772 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.899837 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.906483 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.911635 kubelet[1853]: E0913 00:55:16.911589 1853 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:16.913795 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.913847 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.913874 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.919158 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.919212 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.927871 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.927913 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.927941 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.937903 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.937967 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.937991 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.943610 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.943665 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.949412 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.949503 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.952634 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.955636 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.961763 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.961812 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.964717 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.967477 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.972776 kubelet[1853]: E0913 00:55:16.972721 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:16.973144 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.978648 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.978706 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.978728 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.983888 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.984461 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.987150 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.992289 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.992324 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.997488 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.997530 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.002293 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.002328 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.007057 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.007094 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.011982 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.012018 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.017278 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.017317 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.022866 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.022919 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.028123 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.028194 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.030479 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.035120 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.035196 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.039973 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.040044 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.045086 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.045160 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.049712 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.049771 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.054702 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.054755 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.059713 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.059761 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.065025 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.065098 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.069908 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.069965 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.074522 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.074573 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.079304 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.079358 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.083922 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.083950 kernel: Failed to create system directory sunrpc Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:16.699000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.089045 kernel: Failed to create system directory sunrpc Sep 13 00:55:17.101844 kernel: RPC: Registered named UNIX socket transport module. Sep 13 00:55:17.101916 kernel: RPC: Registered udp transport module. Sep 13 00:55:17.101957 kernel: RPC: Registered tcp transport module. Sep 13 00:55:17.104061 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 00:55:16.699000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558bc29afad0 a1=1a8274 a2=558b8ae852b0 a3=5 items=6 ppid=2027 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:16.699000 audit: CWD cwd="/" Sep 13 00:55:16.699000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:16.699000 audit: PATH item=1 name=(null) inode=26932 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:16.699000 audit: PATH item=2 name=(null) inode=26932 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:16.699000 audit: PATH item=3 name=(null) inode=26933 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:16.699000 audit: PATH item=4 name=(null) inode=26932 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:16.699000 audit: PATH item=5 name=(null) inode=26934 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:16.699000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.173655 kernel: Failed to create system directory nfs Sep 13 00:55:17.173751 kernel: Failed to create system directory nfs Sep 13 00:55:17.173790 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.176195 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.181287 kernel: Failed to create system directory nfs Sep 13 00:55:17.181351 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.184159 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.189332 kernel: Failed to create system directory nfs Sep 13 00:55:17.189385 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.191749 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.194276 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.196811 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.199333 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.204697 kernel: Failed to create system directory nfs Sep 13 00:55:17.204732 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.208154 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.212332 kernel: Failed to create system directory nfs Sep 13 00:55:17.212387 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.217696 kernel: Failed to create system directory nfs Sep 13 00:55:17.217763 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.222842 kernel: Failed to create system directory nfs Sep 13 00:55:17.222888 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.228036 kernel: Failed to create system directory nfs Sep 13 00:55:17.228104 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.233254 kernel: Failed to create system directory nfs Sep 13 00:55:17.233319 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.238410 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.241059 kernel: Failed to create system directory nfs Sep 13 00:55:17.241104 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.246176 kernel: Failed to create system directory nfs Sep 13 00:55:17.246220 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.251268 kernel: Failed to create system directory nfs Sep 13 00:55:17.251318 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.256499 kernel: Failed to create system directory nfs Sep 13 00:55:17.256548 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.261694 kernel: Failed to create system directory nfs Sep 13 00:55:17.261734 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.266877 kernel: Failed to create system directory nfs Sep 13 00:55:17.266932 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.270199 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.272179 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.277165 kernel: Failed to create system directory nfs Sep 13 00:55:17.277246 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.282267 kernel: Failed to create system directory nfs Sep 13 00:55:17.282303 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.287423 kernel: Failed to create system directory nfs Sep 13 00:55:17.287475 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.290322 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.295408 kernel: Failed to create system directory nfs Sep 13 00:55:17.295449 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.300792 kernel: Failed to create system directory nfs Sep 13 00:55:17.300847 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.305885 kernel: Failed to create system directory nfs Sep 13 00:55:17.305919 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.308459 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.310808 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.313372 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.318421 kernel: Failed to create system directory nfs Sep 13 00:55:17.318456 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.159000 audit[3346]: AVC avc: denied { confidentiality } for pid=3346 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.323490 kernel: Failed to create system directory nfs Sep 13 00:55:17.159000 audit[3346]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558bc2bd0c10 a1=16eb2c a2=558b8ae852b0 a3=5 items=0 ppid=2027 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:17.159000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:55:17.344158 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.395256 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.395290 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.400669 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.401174 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.406021 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.406049 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.409173 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.414169 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.416903 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.419621 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.422398 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.425054 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.425150 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.428192 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.433293 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.433342 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.436194 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.441440 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.441479 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.444160 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.447164 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.452033 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.452081 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.457177 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.457227 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.462389 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.462435 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.467641 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.467681 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.472969 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.473018 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.478157 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.478214 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.483322 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.483376 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.488635 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.488681 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.494010 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.494049 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.496630 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.499176 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.507508 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.507555 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.507581 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.512872 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.512929 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.518093 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.518172 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.523235 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.523268 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.528396 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.528437 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.531191 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.536293 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.536355 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.541530 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.541607 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.544073 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.546946 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.552775 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.552806 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.557643 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.557676 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.562061 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.562098 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.564727 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.567274 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.569831 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.574619 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.574674 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.576776 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.579608 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.581817 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.583930 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.586089 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.588258 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.590521 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.592919 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.595649 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.599909 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.599937 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.602208 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.604466 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.607173 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.609192 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.613547 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.613582 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.617842 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.617879 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.620005 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.622247 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.624386 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.626885 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.629053 kernel: Failed to create system directory nfs4 Sep 13 00:55:17.381000 audit[3370]: AVC avc: denied { confidentiality } for pid=3370 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.747785 kernel: NFS: Registering the id_resolver key type Sep 13 00:55:17.747898 kernel: Key type id_resolver registered Sep 13 00:55:17.749969 kernel: Key type id_legacy registered Sep 13 00:55:17.381000 audit[3370]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f26148e3010 a1=2095c4 a2=560c8fcc42b0 a3=5 items=0 ppid=2027 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:17.381000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.777923 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.777971 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.777994 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.783377 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.783415 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.788594 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.788637 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.793861 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.793914 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.796541 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.799880 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.805241 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.805324 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.810607 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.810637 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.813220 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.816199 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.821635 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.821667 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.824291 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.826951 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.829852 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.835014 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.835045 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.837711 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.840462 kernel: Failed to create system directory rpcgss Sep 13 00:55:17.770000 audit[3371]: AVC avc: denied { confidentiality } for pid=3371 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:17.770000 audit[3371]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f218b259010 a1=70bf4 a2=557f87cd32b0 a3=5 items=0 ppid=2027 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:17.770000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 00:55:17.921367 nfsidmap[3378]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-ad8a68f24a' Sep 13 00:55:17.926735 nfsidmap[3379]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-ad8a68f24a' Sep 13 00:55:17.938000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:55:17.938000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:55:17.938000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:55:17.938000 audit[1523]: AVC avc: denied { watch_reads } for pid=1523 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:55:17.938000 audit[1523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ed8a5ebb90 a2=10 a3=dadd2915bbc57c24 items=0 ppid=1 pid=1523 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:17.938000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:55:17.938000 audit[1523]: AVC avc: denied { watch_reads } for pid=1523 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:55:17.938000 audit[1523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ed8a5ebb90 a2=10 a3=dadd2915bbc57c24 items=0 ppid=1 pid=1523 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:17.938000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:55:17.938000 audit[1523]: AVC avc: denied { watch_reads } for pid=1523 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:55:17.938000 audit[1523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ed8a5ebb90 a2=10 a3=dadd2915bbc57c24 items=0 ppid=1 pid=1523 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:17.938000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:55:17.973663 kubelet[1853]: E0913 00:55:17.973642 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:18.047641 env[1412]: time="2025-09-13T00:55:18.047549528Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c536bf67-925a-40ee-8d77-deafcd5645ca,Namespace:default,Attempt:0,}" Sep 13 00:55:18.201306 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:55:18.201556 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 00:55:18.193528 systemd-networkd[1564]: cali5ec59c6bf6e: Link UP Sep 13 00:55:18.202112 systemd-networkd[1564]: cali5ec59c6bf6e: Gained carrier Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.130 [INFO][3380] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.19-k8s-test--pod--1-eth0 default c536bf67-925a-40ee-8d77-deafcd5645ca 1639 0 2025-09-13 00:54:30 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.19 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.130 [INFO][3380] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-eth0" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.152 [INFO][3392] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" HandleID="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Workload="10.200.4.19-k8s-test--pod--1-eth0" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.152 [INFO][3392] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" HandleID="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Workload="10.200.4.19-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c5020), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.19", "pod":"test-pod-1", "timestamp":"2025-09-13 00:55:18.152027697 +0000 UTC"}, Hostname:"10.200.4.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.152 [INFO][3392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.152 [INFO][3392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.152 [INFO][3392] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.19' Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.159 [INFO][3392] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.162 [INFO][3392] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.166 [INFO][3392] ipam/ipam.go 511: Trying affinity for 192.168.94.192/26 host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.171 [INFO][3392] ipam/ipam.go 158: Attempting to load block cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.174 [INFO][3392] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.94.192/26 host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.174 [INFO][3392] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.94.192/26 handle="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.175 [INFO][3392] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4 Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.183 [INFO][3392] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.94.192/26 handle="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.190 [INFO][3392] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.94.196/26] block=192.168.94.192/26 handle="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.190 [INFO][3392] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.94.196/26] handle="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" host="10.200.4.19" Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.190 [INFO][3392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:55:18.214121 env[1412]: 2025-09-13 00:55:18.190 [INFO][3392] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.196/26] IPv6=[] ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" HandleID="k8s-pod-network.35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Workload="10.200.4.19-k8s-test--pod--1-eth0" Sep 13 00:55:18.218676 env[1412]: 2025-09-13 00:55:18.191 [INFO][3380] cni-plugin/k8s.go 418: Populated endpoint ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c536bf67-925a-40ee-8d77-deafcd5645ca", ResourceVersion:"1639", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 54, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:18.218676 env[1412]: 2025-09-13 00:55:18.191 [INFO][3380] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.94.196/32] ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-eth0" Sep 13 00:55:18.218676 env[1412]: 2025-09-13 00:55:18.191 [INFO][3380] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-eth0" Sep 13 00:55:18.218676 env[1412]: 2025-09-13 00:55:18.203 [INFO][3380] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-eth0" Sep 13 00:55:18.218676 env[1412]: 2025-09-13 00:55:18.203 [INFO][3380] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c536bf67-925a-40ee-8d77-deafcd5645ca", ResourceVersion:"1639", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 54, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.19", ContainerID:"35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.94.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c2:53:18:a4:c0:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:18.218676 env[1412]: 2025-09-13 00:55:18.213 [INFO][3380] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.19-k8s-test--pod--1-eth0" Sep 13 00:55:18.229000 audit[3407]: NETFILTER_CFG table=filter:85 family=2 entries=36 op=nft_register_chain pid=3407 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:55:18.229000 audit[3407]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffd0e6e7ea0 a2=0 a3=7ffd0e6e7e8c items=0 ppid=2537 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:55:18.238593 env[1412]: time="2025-09-13T00:55:18.238524219Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:18.238593 env[1412]: time="2025-09-13T00:55:18.238561219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:18.238785 env[1412]: time="2025-09-13T00:55:18.238742020Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:18.239031 env[1412]: time="2025-09-13T00:55:18.238977120Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4 pid=3415 runtime=io.containerd.runc.v2 Sep 13 00:55:18.256484 systemd[1]: Started cri-containerd-35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4.scope. Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit: BPF prog-id=130 op=LOAD Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=3415 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643031343135343766643566383231653765643563326239363935 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=3415 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643031343135343766643566383231653765643563326239363935 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.271000 audit: BPF prog-id=131 op=LOAD Sep 13 00:55:18.271000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c79d8 a2=78 a3=c0002c1dc0 items=0 ppid=3415 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643031343135343766643566383231653765643563326239363935 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit: BPF prog-id=132 op=LOAD Sep 13 00:55:18.272000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c7770 a2=78 a3=c0002c1e08 items=0 ppid=3415 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643031343135343766643566383231653765643563326239363935 Sep 13 00:55:18.272000 audit: BPF prog-id=132 op=UNLOAD Sep 13 00:55:18.272000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.272000 audit: BPF prog-id=133 op=LOAD Sep 13 00:55:18.272000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c7c30 a2=78 a3=c000390218 items=0 ppid=3415 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643031343135343766643566383231653765643563326239363935 Sep 13 00:55:18.299479 env[1412]: time="2025-09-13T00:55:18.298430473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c536bf67-925a-40ee-8d77-deafcd5645ca,Namespace:default,Attempt:0,} returns sandbox id \"35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4\"" Sep 13 00:55:18.302227 env[1412]: time="2025-09-13T00:55:18.302123082Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:55:18.642874 env[1412]: time="2025-09-13T00:55:18.642829158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:18.653280 env[1412]: time="2025-09-13T00:55:18.653239185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:18.660862 env[1412]: time="2025-09-13T00:55:18.660833904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:18.664639 env[1412]: time="2025-09-13T00:55:18.664612914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:18.665189 env[1412]: time="2025-09-13T00:55:18.665152915Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:55:18.667715 env[1412]: time="2025-09-13T00:55:18.667689422Z" level=info msg="CreateContainer within sandbox \"35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 00:55:18.715810 env[1412]: time="2025-09-13T00:55:18.715775945Z" level=info msg="CreateContainer within sandbox \"35d0141547fd5f821e7ed5c2b9695c3f0d7edad5d1bd83e10d9cdf7068c176f4\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"72c8eb8bfa0975662009bdc7f3c2df9091d69632f80b8418abfc52e9128eecdc\"" Sep 13 00:55:18.716207 env[1412]: time="2025-09-13T00:55:18.716171546Z" level=info msg="StartContainer for \"72c8eb8bfa0975662009bdc7f3c2df9091d69632f80b8418abfc52e9128eecdc\"" Sep 13 00:55:18.731405 systemd[1]: Started cri-containerd-72c8eb8bfa0975662009bdc7f3c2df9091d69632f80b8418abfc52e9128eecdc.scope. Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit: BPF prog-id=134 op=LOAD Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3415 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633865623862666130393735363632303039626463376633633264 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3415 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633865623862666130393735363632303039626463376633633264 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit: BPF prog-id=135 op=LOAD Sep 13 00:55:18.745000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000ae840 items=0 ppid=3415 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633865623862666130393735363632303039626463376633633264 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.745000 audit: BPF prog-id=136 op=LOAD Sep 13 00:55:18.745000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000ae888 items=0 ppid=3415 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633865623862666130393735363632303039626463376633633264 Sep 13 00:55:18.745000 audit: BPF prog-id=136 op=UNLOAD Sep 13 00:55:18.745000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:18.746000 audit: BPF prog-id=137 op=LOAD Sep 13 00:55:18.746000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000aec98 items=0 ppid=3415 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:18.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633865623862666130393735363632303039626463376633633264 Sep 13 00:55:18.762548 env[1412]: time="2025-09-13T00:55:18.762517565Z" level=info msg="StartContainer for \"72c8eb8bfa0975662009bdc7f3c2df9091d69632f80b8418abfc52e9128eecdc\" returns successfully" Sep 13 00:55:18.974264 kubelet[1853]: E0913 00:55:18.974157 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:19.201591 kubelet[1853]: I0913 00:55:19.201549 1853 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=48.836923849 podStartE2EDuration="49.201536385s" podCreationTimestamp="2025-09-13 00:54:30 +0000 UTC" firstStartedPulling="2025-09-13 00:55:18.301781082 +0000 UTC m=+102.641170143" lastFinishedPulling="2025-09-13 00:55:18.666393518 +0000 UTC m=+103.005782679" observedRunningTime="2025-09-13 00:55:19.201320684 +0000 UTC m=+103.540709745" watchObservedRunningTime="2025-09-13 00:55:19.201536385 +0000 UTC m=+103.540925446" Sep 13 00:55:19.461278 systemd-networkd[1564]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 00:55:19.974857 kubelet[1853]: E0913 00:55:19.974819 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:20.975273 kubelet[1853]: E0913 00:55:20.975246 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:21.975801 kubelet[1853]: E0913 00:55:21.975762 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:22.976863 kubelet[1853]: E0913 00:55:22.976833 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:23.977858 kubelet[1853]: E0913 00:55:23.977822 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:24.977936 kubelet[1853]: E0913 00:55:24.977904 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:25.978709 kubelet[1853]: E0913 00:55:25.978672 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:26.979566 kubelet[1853]: E0913 00:55:26.979537 1853 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"