Sep 13 00:53:16.011930 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:53:16.011957 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:53:16.011970 kernel: BIOS-provided physical RAM map: Sep 13 00:53:16.011979 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 13 00:53:16.011988 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Sep 13 00:53:16.011997 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Sep 13 00:53:16.012008 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc4fff] reserved Sep 13 00:53:16.012014 kernel: BIOS-e820: [mem 0x000000003ffc5000-0x000000003ffd1fff] usable Sep 13 00:53:16.012020 kernel: BIOS-e820: [mem 0x000000003ffd2000-0x000000003fffafff] ACPI data Sep 13 00:53:16.012029 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Sep 13 00:53:16.012039 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Sep 13 00:53:16.022076 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Sep 13 00:53:16.022096 kernel: printk: bootconsole [earlyser0] enabled Sep 13 00:53:16.022106 kernel: NX (Execute Disable) protection: active Sep 13 00:53:16.022122 kernel: efi: EFI v2.70 by Microsoft Sep 13 00:53:16.022132 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f33fa98 RNG=0x3ffd2018 Sep 13 00:53:16.022141 kernel: random: crng init done Sep 13 00:53:16.022151 kernel: SMBIOS 3.1.0 present. Sep 13 00:53:16.022161 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 13 00:53:16.022177 kernel: Hypervisor detected: Microsoft Hyper-V Sep 13 00:53:16.022184 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Sep 13 00:53:16.022190 kernel: Hyper-V Host Build:26100-10.0-1-0.1293 Sep 13 00:53:16.022200 kernel: Hyper-V: Nested features: 0x1e0101 Sep 13 00:53:16.022211 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Sep 13 00:53:16.022218 kernel: Hyper-V: Using hypercall for remote TLB flush Sep 13 00:53:16.022228 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Sep 13 00:53:16.022235 kernel: tsc: Marking TSC unstable due to running on Hyper-V Sep 13 00:53:16.022242 kernel: tsc: Detected 2793.437 MHz processor Sep 13 00:53:16.022248 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:53:16.022260 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:53:16.022268 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Sep 13 00:53:16.022280 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:53:16.022287 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Sep 13 00:53:16.022293 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Sep 13 00:53:16.022300 kernel: Using GB pages for direct mapping Sep 13 00:53:16.022315 kernel: Secure boot disabled Sep 13 00:53:16.022321 kernel: ACPI: Early table checksum verification disabled Sep 13 00:53:16.022328 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Sep 13 00:53:16.022338 kernel: ACPI: XSDT 0x000000003FFF90E8 00005C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022344 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022354 kernel: ACPI: DSDT 0x000000003FFD6000 01E11C (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 13 00:53:16.022360 kernel: ACPI: FACS 0x000000003FFFE000 000040 Sep 13 00:53:16.022366 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022372 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022381 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022391 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022401 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022411 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 00:53:16.022417 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Sep 13 00:53:16.022424 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff411b] Sep 13 00:53:16.022434 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Sep 13 00:53:16.022440 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Sep 13 00:53:16.022448 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Sep 13 00:53:16.022457 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Sep 13 00:53:16.022462 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Sep 13 00:53:16.022473 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Sep 13 00:53:16.022481 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Sep 13 00:53:16.022486 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:53:16.022499 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:53:16.022507 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Sep 13 00:53:16.022514 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Sep 13 00:53:16.022526 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Sep 13 00:53:16.022533 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Sep 13 00:53:16.022541 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Sep 13 00:53:16.022551 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Sep 13 00:53:16.022557 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Sep 13 00:53:16.022566 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Sep 13 00:53:16.022573 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Sep 13 00:53:16.022579 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Sep 13 00:53:16.022590 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Sep 13 00:53:16.022597 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Sep 13 00:53:16.022605 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Sep 13 00:53:16.022616 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Sep 13 00:53:16.022622 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Sep 13 00:53:16.022630 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Sep 13 00:53:16.022638 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Sep 13 00:53:16.022644 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Sep 13 00:53:16.022654 kernel: Zone ranges: Sep 13 00:53:16.022661 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:53:16.022667 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 13 00:53:16.022676 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:53:16.022686 kernel: Movable zone start for each node Sep 13 00:53:16.022696 kernel: Early memory node ranges Sep 13 00:53:16.022705 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 13 00:53:16.022715 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Sep 13 00:53:16.022722 kernel: node 0: [mem 0x000000003ffc5000-0x000000003ffd1fff] Sep 13 00:53:16.022731 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Sep 13 00:53:16.022737 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Sep 13 00:53:16.022743 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Sep 13 00:53:16.022752 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:53:16.022766 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 13 00:53:16.022774 kernel: On node 0, zone DMA32: 132 pages in unavailable ranges Sep 13 00:53:16.022784 kernel: On node 0, zone DMA32: 45 pages in unavailable ranges Sep 13 00:53:16.022790 kernel: ACPI: PM-Timer IO Port: 0x408 Sep 13 00:53:16.022797 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Sep 13 00:53:16.022806 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:53:16.022812 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:53:16.022819 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:53:16.022828 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Sep 13 00:53:16.022841 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:53:16.022851 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Sep 13 00:53:16.022857 kernel: Booting paravirtualized kernel on Hyper-V Sep 13 00:53:16.022865 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:53:16.022874 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:53:16.022880 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:53:16.022889 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:53:16.022896 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:53:16.022902 kernel: Hyper-V: PV spinlocks enabled Sep 13 00:53:16.022913 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 13 00:53:16.022921 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062375 Sep 13 00:53:16.022928 kernel: Policy zone: Normal Sep 13 00:53:16.022939 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:53:16.022945 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:53:16.022954 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 13 00:53:16.022962 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:53:16.022968 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:53:16.022979 kernel: Memory: 8076668K/8387512K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 310584K reserved, 0K cma-reserved) Sep 13 00:53:16.022987 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:53:16.023002 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:53:16.023012 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:53:16.023020 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:53:16.023029 kernel: rcu: RCU event tracing is enabled. Sep 13 00:53:16.023035 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:53:16.023045 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:53:16.023072 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:53:16.023078 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:53:16.023087 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:53:16.023096 kernel: Using NULL legacy PIC Sep 13 00:53:16.023112 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Sep 13 00:53:16.023120 kernel: Console: colour dummy device 80x25 Sep 13 00:53:16.023134 kernel: printk: console [tty1] enabled Sep 13 00:53:16.023143 kernel: printk: console [ttyS0] enabled Sep 13 00:53:16.023153 kernel: printk: bootconsole [earlyser0] disabled Sep 13 00:53:16.023161 kernel: ACPI: Core revision 20210730 Sep 13 00:53:16.023168 kernel: Failed to register legacy timer interrupt Sep 13 00:53:16.023179 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:53:16.023185 kernel: Hyper-V: Using IPI hypercalls Sep 13 00:53:16.023194 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5586.87 BogoMIPS (lpj=2793437) Sep 13 00:53:16.023202 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 13 00:53:16.023209 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 13 00:53:16.023219 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 13 00:53:16.023227 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:53:16.023234 kernel: Spectre V2 : Mitigation: Retpolines Sep 13 00:53:16.023240 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:53:16.023249 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 13 00:53:16.023258 kernel: RETBleed: Vulnerable Sep 13 00:53:16.023264 kernel: Speculative Store Bypass: Vulnerable Sep 13 00:53:16.023271 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:53:16.023284 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:53:16.023292 kernel: active return thunk: its_return_thunk Sep 13 00:53:16.023298 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:53:16.023309 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:53:16.023316 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:53:16.023326 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:53:16.023334 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 13 00:53:16.023340 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 13 00:53:16.023347 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 13 00:53:16.023357 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:53:16.023363 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Sep 13 00:53:16.023370 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Sep 13 00:53:16.023380 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Sep 13 00:53:16.023386 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Sep 13 00:53:16.023393 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:53:16.023403 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:53:16.023411 kernel: LSM: Security Framework initializing Sep 13 00:53:16.023418 kernel: SELinux: Initializing. Sep 13 00:53:16.023428 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:53:16.023434 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:53:16.023441 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8370C CPU @ 2.80GHz (family: 0x6, model: 0x6a, stepping: 0x6) Sep 13 00:53:16.023452 kernel: Performance Events: unsupported p6 CPU model 106 no PMU driver, software events only. Sep 13 00:53:16.023458 kernel: signal: max sigframe size: 3632 Sep 13 00:53:16.023466 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:53:16.023475 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:53:16.023482 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:53:16.023493 kernel: x86: Booting SMP configuration: Sep 13 00:53:16.023501 kernel: .... node #0, CPUs: #1 Sep 13 00:53:16.023509 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Sep 13 00:53:16.023520 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 13 00:53:16.023526 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:53:16.023534 kernel: smpboot: Max logical packages: 1 Sep 13 00:53:16.023543 kernel: smpboot: Total of 2 processors activated (11173.74 BogoMIPS) Sep 13 00:53:16.023549 kernel: devtmpfs: initialized Sep 13 00:53:16.023561 kernel: x86/mm: Memory block size: 128MB Sep 13 00:53:16.023571 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Sep 13 00:53:16.023581 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:53:16.023588 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:53:16.023599 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:53:16.023605 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:53:16.023611 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:53:16.023620 kernel: audit: type=2000 audit(1757724795.023:1): state=initialized audit_enabled=0 res=1 Sep 13 00:53:16.023632 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:53:16.023640 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:53:16.023648 kernel: cpuidle: using governor menu Sep 13 00:53:16.023657 kernel: ACPI: bus type PCI registered Sep 13 00:53:16.023664 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:53:16.023673 kernel: dca service started, version 1.12.1 Sep 13 00:53:16.023681 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:53:16.023687 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:53:16.023698 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:53:16.023705 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:53:16.023713 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:53:16.023725 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:53:16.023731 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:53:16.023737 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:53:16.023743 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:53:16.023749 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:53:16.023759 kernel: ACPI: Interpreter enabled Sep 13 00:53:16.023767 kernel: ACPI: PM: (supports S0 S5) Sep 13 00:53:16.023773 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:53:16.023783 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:53:16.023800 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Sep 13 00:53:16.023810 kernel: iommu: Default domain type: Translated Sep 13 00:53:16.023817 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:53:16.023823 kernel: vgaarb: loaded Sep 13 00:53:16.023831 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:53:16.023840 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:53:16.023846 kernel: PTP clock support registered Sep 13 00:53:16.023853 kernel: Registered efivars operations Sep 13 00:53:16.023871 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:53:16.023881 kernel: PCI: System does not support PCI Sep 13 00:53:16.023891 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Sep 13 00:53:16.023897 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:53:16.023904 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:53:16.023922 kernel: pnp: PnP ACPI init Sep 13 00:53:16.023931 kernel: pnp: PnP ACPI: found 3 devices Sep 13 00:53:16.023941 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:53:16.023948 kernel: NET: Registered PF_INET protocol family Sep 13 00:53:16.023956 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:53:16.023973 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 13 00:53:16.023980 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:53:16.023987 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:53:16.024003 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 13 00:53:16.024011 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 13 00:53:16.024017 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:53:16.024029 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:53:16.024035 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:53:16.024045 kernel: NET: Registered PF_XDP protocol family Sep 13 00:53:16.024065 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:53:16.024078 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 13 00:53:16.024089 kernel: software IO TLB: mapped [mem 0x000000003aa89000-0x000000003ea89000] (64MB) Sep 13 00:53:16.024101 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:53:16.024113 kernel: Initialise system trusted keyrings Sep 13 00:53:16.024124 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 13 00:53:16.024136 kernel: Key type asymmetric registered Sep 13 00:53:16.024148 kernel: Asymmetric key parser 'x509' registered Sep 13 00:53:16.024159 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:53:16.024174 kernel: io scheduler mq-deadline registered Sep 13 00:53:16.024185 kernel: io scheduler kyber registered Sep 13 00:53:16.024196 kernel: io scheduler bfq registered Sep 13 00:53:16.024209 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:53:16.024221 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:53:16.024233 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:53:16.024245 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 13 00:53:16.024257 kernel: i8042: PNP: No PS/2 controller found. Sep 13 00:53:16.024412 kernel: rtc_cmos 00:02: registered as rtc0 Sep 13 00:53:16.024525 kernel: rtc_cmos 00:02: setting system clock to 2025-09-13T00:53:15 UTC (1757724795) Sep 13 00:53:16.024629 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Sep 13 00:53:16.024643 kernel: intel_pstate: CPU model not supported Sep 13 00:53:16.024655 kernel: efifb: probing for efifb Sep 13 00:53:16.024667 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 00:53:16.024679 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 00:53:16.024691 kernel: efifb: scrolling: redraw Sep 13 00:53:16.024705 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 00:53:16.024717 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:53:16.024729 kernel: fb0: EFI VGA frame buffer device Sep 13 00:53:16.024740 kernel: pstore: Registered efi as persistent store backend Sep 13 00:53:16.024752 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:53:16.024763 kernel: Segment Routing with IPv6 Sep 13 00:53:16.024775 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:53:16.024786 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:53:16.024797 kernel: Key type dns_resolver registered Sep 13 00:53:16.024811 kernel: IPI shorthand broadcast: enabled Sep 13 00:53:16.024823 kernel: sched_clock: Marking stable (737799900, 20569900)->(942335900, -183966100) Sep 13 00:53:16.024833 kernel: registered taskstats version 1 Sep 13 00:53:16.024847 kernel: Loading compiled-in X.509 certificates Sep 13 00:53:16.024862 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:53:16.024878 kernel: Key type .fscrypt registered Sep 13 00:53:16.024890 kernel: Key type fscrypt-provisioning registered Sep 13 00:53:16.024901 kernel: pstore: Using crash dump compression: deflate Sep 13 00:53:16.024914 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:53:16.024928 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:53:16.024941 kernel: ima: No architecture policies found Sep 13 00:53:16.024953 kernel: clk: Disabling unused clocks Sep 13 00:53:16.024965 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:53:16.024977 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:53:16.024990 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:53:16.025002 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:53:16.025014 kernel: Run /init as init process Sep 13 00:53:16.025027 kernel: with arguments: Sep 13 00:53:16.025041 kernel: /init Sep 13 00:53:16.025063 kernel: with environment: Sep 13 00:53:16.025075 kernel: HOME=/ Sep 13 00:53:16.025087 kernel: TERM=linux Sep 13 00:53:16.025099 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:53:16.025115 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:53:16.025130 systemd[1]: Detected virtualization microsoft. Sep 13 00:53:16.025143 systemd[1]: Detected architecture x86-64. Sep 13 00:53:16.025158 systemd[1]: Running in initrd. Sep 13 00:53:16.025171 systemd[1]: No hostname configured, using default hostname. Sep 13 00:53:16.025183 systemd[1]: Hostname set to . Sep 13 00:53:16.025197 systemd[1]: Initializing machine ID from random generator. Sep 13 00:53:16.025210 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:53:16.025222 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:53:16.025235 systemd[1]: Reached target cryptsetup.target. Sep 13 00:53:16.025248 systemd[1]: Reached target paths.target. Sep 13 00:53:16.025262 systemd[1]: Reached target slices.target. Sep 13 00:53:16.025275 systemd[1]: Reached target swap.target. Sep 13 00:53:16.025287 systemd[1]: Reached target timers.target. Sep 13 00:53:16.025301 systemd[1]: Listening on iscsid.socket. Sep 13 00:53:16.025314 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:53:16.025327 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:53:16.025340 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:53:16.025353 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:53:16.025368 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:53:16.025381 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:53:16.025393 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:53:16.025406 systemd[1]: Reached target sockets.target. Sep 13 00:53:16.025419 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:53:16.025432 systemd[1]: Finished network-cleanup.service. Sep 13 00:53:16.025445 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:53:16.025458 systemd[1]: Starting systemd-journald.service... Sep 13 00:53:16.025471 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:53:16.025486 systemd[1]: Starting systemd-resolved.service... Sep 13 00:53:16.025499 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:53:16.025517 systemd-journald[183]: Journal started Sep 13 00:53:16.025577 systemd-journald[183]: Runtime Journal (/run/log/journal/73655a134d7648ddac3751657ba613c7) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:53:16.033072 systemd[1]: Started systemd-journald.service. Sep 13 00:53:16.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.049675 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:53:16.052098 kernel: audit: type=1130 audit(1757724796.037:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.054146 systemd-resolved[185]: Positive Trust Anchors: Sep 13 00:53:16.054712 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:53:16.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.054743 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:53:16.085545 kernel: audit: type=1130 audit(1757724796.056:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.057441 systemd-resolved[185]: Defaulting to hostname 'linux'. Sep 13 00:53:16.058380 systemd[1]: Started systemd-resolved.service. Sep 13 00:53:16.090149 systemd-modules-load[184]: Inserted module 'overlay' Sep 13 00:53:16.112924 kernel: audit: type=1130 audit(1757724796.097:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.097488 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:53:16.115473 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:53:16.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.120890 systemd[1]: Reached target nss-lookup.target. Sep 13 00:53:16.154771 kernel: audit: type=1130 audit(1757724796.115:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.154798 kernel: audit: type=1130 audit(1757724796.118:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.149965 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:53:16.152872 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:53:16.165820 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:53:16.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.189292 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:53:16.189338 kernel: audit: type=1130 audit(1757724796.174:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.189217 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:53:16.212257 kernel: audit: type=1130 audit(1757724796.191:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.192601 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:53:16.218956 systemd-modules-load[184]: Inserted module 'br_netfilter' Sep 13 00:53:16.221957 kernel: Bridge firewalling registered Sep 13 00:53:16.221982 dracut-cmdline[200]: dracut-dracut-053 Sep 13 00:53:16.221982 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:53:16.270065 kernel: SCSI subsystem initialized Sep 13 00:53:16.298167 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:53:16.298244 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:53:16.304010 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:53:16.304030 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:53:16.311774 systemd-modules-load[184]: Inserted module 'dm_multipath' Sep 13 00:53:16.314827 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:53:16.335061 kernel: audit: type=1130 audit(1757724796.317:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.317996 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:53:16.345695 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:53:16.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.362061 kernel: audit: type=1130 audit(1757724796.348:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.368073 kernel: iscsi: registered transport (tcp) Sep 13 00:53:16.396536 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:53:16.396598 kernel: QLogic iSCSI HBA Driver Sep 13 00:53:16.424429 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:53:16.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.429649 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:53:16.480067 kernel: raid6: avx512x4 gen() 44021 MB/s Sep 13 00:53:16.500061 kernel: raid6: avx512x4 xor() 10601 MB/s Sep 13 00:53:16.520059 kernel: raid6: avx512x2 gen() 44416 MB/s Sep 13 00:53:16.540063 kernel: raid6: avx512x2 xor() 26895 MB/s Sep 13 00:53:16.561058 kernel: raid6: avx512x1 gen() 44308 MB/s Sep 13 00:53:16.581058 kernel: raid6: avx512x1 xor() 24753 MB/s Sep 13 00:53:16.601061 kernel: raid6: avx2x4 gen() 35189 MB/s Sep 13 00:53:16.621057 kernel: raid6: avx2x4 xor() 11148 MB/s Sep 13 00:53:16.641057 kernel: raid6: avx2x2 gen() 34820 MB/s Sep 13 00:53:16.661059 kernel: raid6: avx2x2 xor() 21410 MB/s Sep 13 00:53:16.681059 kernel: raid6: avx2x1 gen() 26277 MB/s Sep 13 00:53:16.701062 kernel: raid6: avx2x1 xor() 17226 MB/s Sep 13 00:53:16.722060 kernel: raid6: sse2x4 gen() 10135 MB/s Sep 13 00:53:16.742056 kernel: raid6: sse2x4 xor() 5950 MB/s Sep 13 00:53:16.762056 kernel: raid6: sse2x2 gen() 10208 MB/s Sep 13 00:53:16.782060 kernel: raid6: sse2x2 xor() 6618 MB/s Sep 13 00:53:16.802057 kernel: raid6: sse2x1 gen() 9227 MB/s Sep 13 00:53:16.824854 kernel: raid6: sse2x1 xor() 5332 MB/s Sep 13 00:53:16.824868 kernel: raid6: using algorithm avx512x2 gen() 44416 MB/s Sep 13 00:53:16.824880 kernel: raid6: .... xor() 26895 MB/s, rmw enabled Sep 13 00:53:16.828758 kernel: raid6: using avx512x2 recovery algorithm Sep 13 00:53:16.849066 kernel: xor: automatically using best checksumming function avx Sep 13 00:53:16.950072 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:53:16.957616 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:53:16.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.962000 audit: BPF prog-id=7 op=LOAD Sep 13 00:53:16.962000 audit: BPF prog-id=8 op=LOAD Sep 13 00:53:16.962860 systemd[1]: Starting systemd-udevd.service... Sep 13 00:53:16.977607 systemd-udevd[383]: Using default interface naming scheme 'v252'. Sep 13 00:53:16.981747 systemd[1]: Started systemd-udevd.service. Sep 13 00:53:16.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:16.989553 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:53:17.005653 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Sep 13 00:53:17.033698 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:53:17.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:17.038632 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:53:17.073179 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:53:17.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:17.120069 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:53:17.153247 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:53:17.153295 kernel: AES CTR mode by8 optimization enabled Sep 13 00:53:17.153309 kernel: hv_vmbus: Vmbus version:5.2 Sep 13 00:53:17.165070 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 00:53:17.189721 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:53:17.189771 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 13 00:53:17.210072 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 00:53:17.214492 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 00:53:17.220063 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 00:53:17.226073 kernel: scsi host1: storvsc_host_t Sep 13 00:53:17.235465 kernel: scsi host0: storvsc_host_t Sep 13 00:53:17.235653 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 13 00:53:17.235671 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 00:53:17.247126 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 00:53:17.252791 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 5 Sep 13 00:53:17.282285 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 00:53:17.288404 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 00:53:17.288420 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 00:53:17.309085 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 00:53:17.309269 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 00:53:17.309444 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 00:53:17.309609 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 00:53:17.309729 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 00:53:17.309825 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:53:17.309834 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 00:53:17.328068 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#231 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:53:17.349613 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#170 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:53:17.349792 kernel: hv_netvsc 6045bdd2-6538-6045-bdd2-65386045bdd2 eth0: VF slot 1 added Sep 13 00:53:17.363064 kernel: hv_vmbus: registering driver hv_pci Sep 13 00:53:17.371065 kernel: hv_pci 595d3060-b3f3-4857-b290-a14095977ad3: PCI VMBus probing: Using version 0x10004 Sep 13 00:53:17.432801 kernel: hv_pci 595d3060-b3f3-4857-b290-a14095977ad3: PCI host bridge to bus b3f3:00 Sep 13 00:53:17.432967 kernel: pci_bus b3f3:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Sep 13 00:53:17.433148 kernel: pci_bus b3f3:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 00:53:17.433298 kernel: pci b3f3:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 00:53:17.433458 kernel: pci b3f3:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:53:17.433608 kernel: pci b3f3:00:02.0: enabling Extended Tags Sep 13 00:53:17.433760 kernel: pci b3f3:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at b3f3:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 00:53:17.433911 kernel: pci_bus b3f3:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 00:53:17.434059 kernel: pci b3f3:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Sep 13 00:53:17.522753 kernel: mlx5_core b3f3:00:02.0: enabling device (0000 -> 0002) Sep 13 00:53:17.769866 kernel: mlx5_core b3f3:00:02.0: firmware version: 16.30.5000 Sep 13 00:53:17.769992 kernel: mlx5_core b3f3:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 00:53:17.770129 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (442) Sep 13 00:53:17.770139 kernel: mlx5_core b3f3:00:02.0: Supported tc offload range - chains: 1, prios: 1 Sep 13 00:53:17.770235 kernel: mlx5_core b3f3:00:02.0: mlx5e_tc_post_act_init:40:(pid 187): firmware level support is missing Sep 13 00:53:17.770330 kernel: hv_netvsc 6045bdd2-6538-6045-bdd2-65386045bdd2 eth0: VF registering: eth1 Sep 13 00:53:17.770423 kernel: mlx5_core b3f3:00:02.0 eth1: joined to eth0 Sep 13 00:53:17.736948 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:53:17.754101 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:53:17.784069 kernel: mlx5_core b3f3:00:02.0 enP46067s1: renamed from eth1 Sep 13 00:53:17.978801 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:53:17.984824 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:53:17.988320 systemd[1]: Starting disk-uuid.service... Sep 13 00:53:18.016773 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:53:19.011970 disk-uuid[562]: The operation has completed successfully. Sep 13 00:53:19.014759 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:53:19.077853 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:53:19.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.077954 systemd[1]: Finished disk-uuid.service. Sep 13 00:53:19.092059 systemd[1]: Starting verity-setup.service... Sep 13 00:53:19.128071 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Sep 13 00:53:19.510628 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:53:19.516334 systemd[1]: Finished verity-setup.service. Sep 13 00:53:19.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.521181 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:53:19.597012 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:53:19.600818 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:53:19.600895 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:53:19.605294 systemd[1]: Starting ignition-setup.service... Sep 13 00:53:19.609020 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:53:19.633517 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:53:19.633556 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:53:19.633570 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:53:19.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.676962 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:53:19.682000 audit: BPF prog-id=9 op=LOAD Sep 13 00:53:19.682964 systemd[1]: Starting systemd-networkd.service... Sep 13 00:53:19.705598 systemd-networkd[835]: lo: Link UP Sep 13 00:53:19.705607 systemd-networkd[835]: lo: Gained carrier Sep 13 00:53:19.709598 systemd-networkd[835]: Enumeration completed Sep 13 00:53:19.709683 systemd[1]: Started systemd-networkd.service. Sep 13 00:53:19.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.714478 systemd-networkd[835]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:53:19.716208 systemd[1]: Reached target network.target. Sep 13 00:53:19.724180 systemd[1]: Starting iscsiuio.service... Sep 13 00:53:19.731681 systemd[1]: Started iscsiuio.service. Sep 13 00:53:19.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.735284 systemd[1]: Starting iscsid.service... Sep 13 00:53:19.741158 iscsid[840]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:53:19.741158 iscsid[840]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:53:19.741158 iscsid[840]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:53:19.741158 iscsid[840]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:53:19.741158 iscsid[840]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:53:19.778719 kernel: mlx5_core b3f3:00:02.0 enP46067s1: Link up Sep 13 00:53:19.778968 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:53:19.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.779066 iscsid[840]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:53:19.742762 systemd[1]: Started iscsid.service. Sep 13 00:53:19.747386 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:53:19.761943 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:53:19.778796 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:53:19.784321 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:53:19.787791 systemd[1]: Reached target remote-fs.target. Sep 13 00:53:19.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.791316 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:53:19.800524 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:53:19.821395 kernel: hv_netvsc 6045bdd2-6538-6045-bdd2-65386045bdd2 eth0: Data path switched to VF: enP46067s1 Sep 13 00:53:19.821609 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:53:19.821531 systemd-networkd[835]: enP46067s1: Link UP Sep 13 00:53:19.821788 systemd-networkd[835]: eth0: Link UP Sep 13 00:53:19.822202 systemd-networkd[835]: eth0: Gained carrier Sep 13 00:53:19.830468 systemd-networkd[835]: enP46067s1: Gained carrier Sep 13 00:53:19.845108 systemd-networkd[835]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:53:19.868575 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:53:19.978572 systemd[1]: Finished ignition-setup.service. Sep 13 00:53:19.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:19.979603 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:53:21.683158 systemd-networkd[835]: eth0: Gained IPv6LL Sep 13 00:53:23.322088 ignition[862]: Ignition 2.14.0 Sep 13 00:53:23.322102 ignition[862]: Stage: fetch-offline Sep 13 00:53:23.322168 ignition[862]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:23.322204 ignition[862]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:23.414451 ignition[862]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:23.417366 ignition[862]: parsed url from cmdline: "" Sep 13 00:53:23.417375 ignition[862]: no config URL provided Sep 13 00:53:23.417383 ignition[862]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:53:23.417395 ignition[862]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:53:23.417403 ignition[862]: failed to fetch config: resource requires networking Sep 13 00:53:23.420168 ignition[862]: Ignition finished successfully Sep 13 00:53:23.429231 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:53:23.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.433419 systemd[1]: Starting ignition-fetch.service... Sep 13 00:53:23.459850 kernel: kauditd_printk_skb: 18 callbacks suppressed Sep 13 00:53:23.459879 kernel: audit: type=1130 audit(1757724803.432:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.460761 ignition[868]: Ignition 2.14.0 Sep 13 00:53:23.460772 ignition[868]: Stage: fetch Sep 13 00:53:23.460900 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:23.460930 ignition[868]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:23.466489 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:23.466633 ignition[868]: parsed url from cmdline: "" Sep 13 00:53:23.466636 ignition[868]: no config URL provided Sep 13 00:53:23.466643 ignition[868]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:53:23.466661 ignition[868]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:53:23.466697 ignition[868]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 00:53:23.533542 ignition[868]: GET result: OK Sep 13 00:53:23.533591 ignition[868]: config has been read from IMDS userdata Sep 13 00:53:23.533607 ignition[868]: parsing config with SHA512: 8af372a6745b2e07c1d167624da94dbe0c30c903161713cbb257ad6e0c2fb338fa33811152f0e0e8ddcbc19aaf54e25e95b6675eadef23e7567c0f106cfa9031 Sep 13 00:53:23.551957 unknown[868]: fetched base config from "system" Sep 13 00:53:23.554422 unknown[868]: fetched base config from "system" Sep 13 00:53:23.554438 unknown[868]: fetched user config from "azure" Sep 13 00:53:23.558706 ignition[868]: fetch: fetch complete Sep 13 00:53:23.558715 ignition[868]: fetch: fetch passed Sep 13 00:53:23.558766 ignition[868]: Ignition finished successfully Sep 13 00:53:23.565148 systemd[1]: Finished ignition-fetch.service. Sep 13 00:53:23.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.582080 kernel: audit: type=1130 audit(1757724803.567:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.580456 systemd[1]: Starting ignition-kargs.service... Sep 13 00:53:23.591921 ignition[874]: Ignition 2.14.0 Sep 13 00:53:23.591930 ignition[874]: Stage: kargs Sep 13 00:53:23.592071 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:23.592100 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:23.599318 systemd[1]: Finished ignition-kargs.service. Sep 13 00:53:23.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.596208 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:23.625673 kernel: audit: type=1130 audit(1757724803.607:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.608157 systemd[1]: Starting ignition-disks.service... Sep 13 00:53:23.597835 ignition[874]: kargs: kargs passed Sep 13 00:53:23.597884 ignition[874]: Ignition finished successfully Sep 13 00:53:23.616439 ignition[880]: Ignition 2.14.0 Sep 13 00:53:23.616445 ignition[880]: Stage: disks Sep 13 00:53:23.616564 ignition[880]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:23.616603 ignition[880]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:23.646863 ignition[880]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:23.650361 ignition[880]: disks: disks passed Sep 13 00:53:23.650425 ignition[880]: Ignition finished successfully Sep 13 00:53:23.654559 systemd[1]: Finished ignition-disks.service. Sep 13 00:53:23.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.657420 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:53:23.678715 kernel: audit: type=1130 audit(1757724803.657:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.672967 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:53:23.678697 systemd[1]: Reached target local-fs.target. Sep 13 00:53:23.681304 systemd[1]: Reached target sysinit.target. Sep 13 00:53:23.686129 systemd[1]: Reached target basic.target. Sep 13 00:53:23.688942 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:53:23.750893 systemd-fsck[888]: ROOT: clean, 629/7326000 files, 481084/7359488 blocks Sep 13 00:53:23.761018 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:53:23.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.766433 systemd[1]: Mounting sysroot.mount... Sep 13 00:53:23.782265 kernel: audit: type=1130 audit(1757724803.765:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:23.793918 systemd[1]: Mounted sysroot.mount. Sep 13 00:53:23.797584 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:53:23.797698 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:53:23.852326 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:53:23.857980 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 00:53:23.863259 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:53:23.863386 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:53:23.874465 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:53:23.926265 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:53:23.932707 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:53:23.943063 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (899) Sep 13 00:53:23.955578 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:53:23.955619 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:53:23.955633 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:53:23.961252 initrd-setup-root[904]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:53:23.969676 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:53:23.995903 initrd-setup-root[930]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:53:24.014440 initrd-setup-root[938]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:53:24.035652 initrd-setup-root[946]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:53:24.777089 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:53:24.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:24.782476 systemd[1]: Starting ignition-mount.service... Sep 13 00:53:24.795070 kernel: audit: type=1130 audit(1757724804.781:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:24.799119 systemd[1]: Starting sysroot-boot.service... Sep 13 00:53:24.804550 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:53:24.807291 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:53:24.825549 systemd[1]: Finished sysroot-boot.service. Sep 13 00:53:24.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:24.841076 kernel: audit: type=1130 audit(1757724804.827:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:24.910556 ignition[968]: INFO : Ignition 2.14.0 Sep 13 00:53:24.910556 ignition[968]: INFO : Stage: mount Sep 13 00:53:24.915129 ignition[968]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:24.915129 ignition[968]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:24.926771 ignition[968]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:24.926771 ignition[968]: INFO : mount: mount passed Sep 13 00:53:24.926771 ignition[968]: INFO : Ignition finished successfully Sep 13 00:53:24.945810 kernel: audit: type=1130 audit(1757724804.926:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:24.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:24.922887 systemd[1]: Finished ignition-mount.service. Sep 13 00:53:25.585345 coreos-metadata[898]: Sep 13 00:53:25.585 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 00:53:25.605428 coreos-metadata[898]: Sep 13 00:53:25.605 INFO Fetch successful Sep 13 00:53:25.638000 coreos-metadata[898]: Sep 13 00:53:25.637 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 00:53:25.650367 coreos-metadata[898]: Sep 13 00:53:25.650 INFO Fetch successful Sep 13 00:53:25.669070 coreos-metadata[898]: Sep 13 00:53:25.668 INFO wrote hostname ci-3510.3.8-n-99b5c97c7e to /sysroot/etc/hostname Sep 13 00:53:25.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:25.670735 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 00:53:25.677266 systemd[1]: Starting ignition-files.service... Sep 13 00:53:25.690384 kernel: audit: type=1130 audit(1757724805.676:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:25.698795 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:53:25.721998 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (977) Sep 13 00:53:25.722041 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:53:25.722079 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:53:25.729636 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:53:25.736376 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:53:25.748538 ignition[996]: INFO : Ignition 2.14.0 Sep 13 00:53:25.748538 ignition[996]: INFO : Stage: files Sep 13 00:53:25.752986 ignition[996]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:25.752986 ignition[996]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:25.766639 ignition[996]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:25.813720 ignition[996]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:53:25.841675 ignition[996]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:53:25.841675 ignition[996]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:53:25.916579 ignition[996]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:53:25.920481 ignition[996]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:53:25.931451 unknown[996]: wrote ssh authorized keys file for user: core Sep 13 00:53:25.934407 ignition[996]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:53:25.946978 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:53:25.951865 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:53:25.961462 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:53:25.966143 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:53:25.966143 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:53:25.966143 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:53:25.984210 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:53:25.984210 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:53:25.984210 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1588316971" Sep 13 00:53:25.984210 ignition[996]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1588316971": device or resource busy Sep 13 00:53:25.984210 ignition[996]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1588316971", trying btrfs: device or resource busy Sep 13 00:53:25.984210 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1588316971" Sep 13 00:53:25.984210 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1588316971" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1588316971" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1588316971" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2353554472" Sep 13 00:53:26.029508 ignition[996]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2353554472": device or resource busy Sep 13 00:53:26.029508 ignition[996]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2353554472", trying btrfs: device or resource busy Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2353554472" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2353554472" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2353554472" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2353554472" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:53:26.029508 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Sep 13 00:53:25.990098 systemd[1]: mnt-oem1588316971.mount: Deactivated successfully. Sep 13 00:53:26.004764 systemd[1]: mnt-oem2353554472.mount: Deactivated successfully. Sep 13 00:53:26.475231 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 13 00:53:26.659222 ignition[996]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:53:26.659222 ignition[996]: INFO : files: op(f): [started] processing unit "waagent.service" Sep 13 00:53:26.659222 ignition[996]: INFO : files: op(f): [finished] processing unit "waagent.service" Sep 13 00:53:26.659222 ignition[996]: INFO : files: op(10): [started] processing unit "nvidia.service" Sep 13 00:53:26.659222 ignition[996]: INFO : files: op(10): [finished] processing unit "nvidia.service" Sep 13 00:53:26.697681 kernel: audit: type=1130 audit(1757724806.667:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.697766 ignition[996]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Sep 13 00:53:26.697766 ignition[996]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Sep 13 00:53:26.697766 ignition[996]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Sep 13 00:53:26.697766 ignition[996]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:53:26.697766 ignition[996]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:53:26.697766 ignition[996]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:53:26.697766 ignition[996]: INFO : files: files passed Sep 13 00:53:26.697766 ignition[996]: INFO : Ignition finished successfully Sep 13 00:53:26.664874 systemd[1]: Finished ignition-files.service. Sep 13 00:53:26.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.668116 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:53:26.736980 initrd-setup-root-after-ignition[1020]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:53:26.686339 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:53:26.697545 systemd[1]: Starting ignition-quench.service... Sep 13 00:53:26.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.704176 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:53:26.728879 systemd[1]: Reached target ignition-complete.target. Sep 13 00:53:26.732011 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:53:26.747512 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:53:26.747622 systemd[1]: Finished ignition-quench.service. Sep 13 00:53:26.762290 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:53:26.764658 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:53:26.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.768456 systemd[1]: Reached target initrd-fs.target. Sep 13 00:53:26.772694 systemd[1]: Reached target initrd.target. Sep 13 00:53:26.776149 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:53:26.779564 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:53:26.790112 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:53:26.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.794642 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:53:26.804021 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:53:26.807430 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:53:26.812724 systemd[1]: Stopped target timers.target. Sep 13 00:53:26.818598 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:53:26.818740 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:53:26.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.831315 systemd[1]: Stopped target initrd.target. Sep 13 00:53:26.837778 systemd[1]: Stopped target basic.target. Sep 13 00:53:26.841246 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:53:26.850868 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:53:26.854122 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:53:26.859208 systemd[1]: Stopped target remote-fs.target. Sep 13 00:53:26.863718 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:53:26.867743 systemd[1]: Stopped target sysinit.target. Sep 13 00:53:26.871558 systemd[1]: Stopped target local-fs.target. Sep 13 00:53:26.875169 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:53:26.878840 systemd[1]: Stopped target swap.target. Sep 13 00:53:26.882829 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:53:26.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.883016 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:53:26.886544 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:53:26.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.890550 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:53:26.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.890724 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:53:26.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.894532 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:53:26.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.894681 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:53:26.899636 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:53:26.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.920854 ignition[1034]: INFO : Ignition 2.14.0 Sep 13 00:53:26.920854 ignition[1034]: INFO : Stage: umount Sep 13 00:53:26.920854 ignition[1034]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:53:26.920854 ignition[1034]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 00:53:26.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.899764 systemd[1]: Stopped ignition-files.service. Sep 13 00:53:26.947892 ignition[1034]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 00:53:26.947892 ignition[1034]: INFO : umount: umount passed Sep 13 00:53:26.947892 ignition[1034]: INFO : Ignition finished successfully Sep 13 00:53:26.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.904045 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 00:53:26.904199 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 00:53:26.909157 systemd[1]: Stopping ignition-mount.service... Sep 13 00:53:26.912608 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:53:26.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.912798 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:53:26.920453 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:53:26.924847 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:53:26.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.925090 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:53:26.927741 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:53:27.003000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:53:26.927907 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:53:27.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.937723 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:53:26.937824 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:53:26.948229 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:53:26.948311 systemd[1]: Stopped ignition-mount.service. Sep 13 00:53:26.953327 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:53:27.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.953391 systemd[1]: Stopped ignition-disks.service. Sep 13 00:53:27.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:27.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.956150 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:53:26.956193 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:53:26.960284 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:53:27.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.960328 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:53:26.967181 systemd[1]: Stopped target network.target. Sep 13 00:53:26.970544 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:53:26.970604 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:53:26.974962 systemd[1]: Stopped target paths.target. Sep 13 00:53:26.976519 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:53:27.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.980148 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:53:27.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.982208 systemd[1]: Stopped target slices.target. Sep 13 00:53:27.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.983857 systemd[1]: Stopped target sockets.target. Sep 13 00:53:26.983969 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:53:26.984025 systemd[1]: Closed iscsid.socket. Sep 13 00:53:26.984351 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:53:26.984380 systemd[1]: Closed iscsiuio.socket. Sep 13 00:53:27.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.984724 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:53:27.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:27.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:26.984768 systemd[1]: Stopped ignition-setup.service. Sep 13 00:53:26.985267 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:53:26.985775 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:53:26.988283 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:53:26.994386 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:53:26.994490 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:53:27.001172 systemd-networkd[835]: eth0: DHCPv6 lease lost Sep 13 00:53:27.104444 kernel: hv_netvsc 6045bdd2-6538-6045-bdd2-65386045bdd2 eth0: Data path switched from VF: enP46067s1 Sep 13 00:53:27.096000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:53:27.003681 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:53:27.003779 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:53:27.009896 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:53:27.009932 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:53:27.015323 systemd[1]: Stopping network-cleanup.service... Sep 13 00:53:27.019411 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:53:27.019476 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:53:27.023834 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:53:27.023883 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:53:27.027316 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:53:27.027361 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:53:27.029622 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:53:27.034918 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:53:27.035338 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:53:27.035443 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:53:27.045350 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:53:27.045404 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:53:27.052517 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:53:27.052562 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:53:27.054431 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:53:27.054485 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:53:27.058735 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:53:27.058777 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:53:27.062768 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:53:27.062827 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:53:27.067011 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:53:27.076096 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:53:27.076163 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:53:27.080009 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:53:27.080235 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:53:27.175592 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:53:27.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:27.175746 systemd[1]: Stopped network-cleanup.service. Sep 13 00:53:27.290801 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:53:27.290920 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:53:27.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:27.297866 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:53:27.302947 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:53:27.303016 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:53:27.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:27.310730 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:53:27.321568 systemd[1]: Switching root. Sep 13 00:53:27.347777 iscsid[840]: iscsid shutting down. Sep 13 00:53:27.350220 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Sep 13 00:53:27.350286 systemd-journald[183]: Journal stopped Sep 13 00:53:46.286364 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:53:46.286392 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:53:46.286406 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:53:46.286416 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:53:46.286428 kernel: SELinux: policy capability open_perms=1 Sep 13 00:53:46.286437 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:53:46.286449 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:53:46.286461 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:53:46.286470 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:53:46.286477 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:53:46.286498 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:53:46.286518 kernel: kauditd_printk_skb: 40 callbacks suppressed Sep 13 00:53:46.286532 kernel: audit: type=1403 audit(1757724810.420:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:53:46.286544 systemd[1]: Successfully loaded SELinux policy in 351.627ms. Sep 13 00:53:46.286559 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 27.049ms. Sep 13 00:53:46.286572 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:53:46.286602 systemd[1]: Detected virtualization microsoft. Sep 13 00:53:46.286613 systemd[1]: Detected architecture x86-64. Sep 13 00:53:46.286624 systemd[1]: Detected first boot. Sep 13 00:53:46.286641 systemd[1]: Hostname set to . Sep 13 00:53:46.286649 systemd[1]: Initializing machine ID from random generator. Sep 13 00:53:46.286662 kernel: audit: type=1400 audit(1757724811.314:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:53:46.286674 kernel: audit: type=1400 audit(1757724811.314:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:53:46.286685 kernel: audit: type=1334 audit(1757724811.343:82): prog-id=10 op=LOAD Sep 13 00:53:46.286693 kernel: audit: type=1334 audit(1757724811.343:83): prog-id=10 op=UNLOAD Sep 13 00:53:46.286712 kernel: audit: type=1334 audit(1757724811.349:84): prog-id=11 op=LOAD Sep 13 00:53:46.286731 kernel: audit: type=1334 audit(1757724811.349:85): prog-id=11 op=UNLOAD Sep 13 00:53:46.286741 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:53:46.286755 kernel: audit: type=1400 audit(1757724813.094:86): avc: denied { associate } for pid=1068 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:53:46.286772 kernel: audit: type=1300 audit(1757724813.094:86): arch=c000003e syscall=188 success=yes exit=0 a0=c000024314 a1=c00002a3d8 a2=c000028840 a3=32 items=0 ppid=1051 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:46.286781 kernel: audit: type=1327 audit(1757724813.094:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:53:46.286793 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:53:46.286806 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:53:46.286819 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:53:46.286840 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:53:46.286863 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 13 00:53:46.286874 kernel: audit: type=1334 audit(1757724825.548:88): prog-id=12 op=LOAD Sep 13 00:53:46.286887 kernel: audit: type=1334 audit(1757724825.548:89): prog-id=3 op=UNLOAD Sep 13 00:53:46.286902 kernel: audit: type=1334 audit(1757724825.554:90): prog-id=13 op=LOAD Sep 13 00:53:46.286913 kernel: audit: type=1334 audit(1757724825.559:91): prog-id=14 op=LOAD Sep 13 00:53:46.286933 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:53:46.286956 kernel: audit: type=1334 audit(1757724825.559:92): prog-id=4 op=UNLOAD Sep 13 00:53:46.286976 kernel: audit: type=1334 audit(1757724825.559:93): prog-id=5 op=UNLOAD Sep 13 00:53:46.286995 kernel: audit: type=1131 audit(1757724825.561:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.287006 systemd[1]: Stopped iscsiuio.service. Sep 13 00:53:46.287017 kernel: audit: type=1334 audit(1757724825.610:95): prog-id=12 op=UNLOAD Sep 13 00:53:46.287030 kernel: audit: type=1131 audit(1757724825.616:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.287042 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:53:46.287059 systemd[1]: Stopped iscsid.service. Sep 13 00:53:46.287078 kernel: audit: type=1131 audit(1757724825.640:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.287088 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:53:46.287101 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:53:46.287112 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:53:46.287124 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:53:46.287133 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:53:46.287156 systemd[1]: Created slice system-getty.slice. Sep 13 00:53:46.287175 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:53:46.287188 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:53:46.287199 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:53:46.287213 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:53:46.287224 systemd[1]: Created slice user.slice. Sep 13 00:53:46.287243 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:53:46.287260 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:53:46.287274 systemd[1]: Set up automount boot.automount. Sep 13 00:53:46.287286 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:53:46.287297 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:53:46.287306 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:53:46.287326 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:53:46.287343 systemd[1]: Reached target integritysetup.target. Sep 13 00:53:46.287352 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:53:46.287364 systemd[1]: Reached target remote-fs.target. Sep 13 00:53:46.287378 systemd[1]: Reached target slices.target. Sep 13 00:53:46.287389 systemd[1]: Reached target swap.target. Sep 13 00:53:46.287399 systemd[1]: Reached target torcx.target. Sep 13 00:53:46.287414 systemd[1]: Reached target veritysetup.target. Sep 13 00:53:46.287431 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:53:46.287444 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:53:46.287454 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:53:46.287469 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:53:46.287479 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:53:46.287500 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:53:46.287517 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:53:46.287528 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:53:46.287539 systemd[1]: Mounting media.mount... Sep 13 00:53:46.287551 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:46.287564 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:53:46.287576 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:53:46.287586 systemd[1]: Mounting tmp.mount... Sep 13 00:53:46.287600 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:53:46.287609 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:46.287628 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:53:46.287650 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:53:46.287662 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:53:46.287673 systemd[1]: Starting modprobe@drm.service... Sep 13 00:53:46.287688 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:53:46.287697 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:53:46.287718 systemd[1]: Starting modprobe@loop.service... Sep 13 00:53:46.287736 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:53:46.287747 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:53:46.287760 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:53:46.287774 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:53:46.287783 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:53:46.287803 systemd[1]: Stopped systemd-journald.service. Sep 13 00:53:46.287822 systemd[1]: Starting systemd-journald.service... Sep 13 00:53:46.287832 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:53:46.287844 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:53:46.287855 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:53:46.287868 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:53:46.287878 kernel: loop: module loaded Sep 13 00:53:46.287910 kernel: fuse: init (API version 7.34) Sep 13 00:53:46.287922 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:53:46.287933 systemd[1]: Stopped verity-setup.service. Sep 13 00:53:46.287953 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:46.287962 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:53:46.287974 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:53:46.287984 systemd[1]: Mounted media.mount. Sep 13 00:53:46.287995 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:53:46.288004 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:53:46.288022 systemd[1]: Mounted tmp.mount. Sep 13 00:53:46.288036 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:53:46.288046 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:53:46.288068 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:53:46.288085 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:53:46.288098 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:53:46.288109 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:53:46.288123 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:53:46.288132 systemd[1]: Finished modprobe@drm.service. Sep 13 00:53:46.288152 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:53:46.288171 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:53:46.288181 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:53:46.288198 systemd-journald[1149]: Journal started Sep 13 00:53:46.288255 systemd-journald[1149]: Runtime Journal (/run/log/journal/bff3936f212b4642bdeb56ad254ece48) is 8.0M, max 159.0M, 151.0M free. Sep 13 00:53:30.420000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:53:31.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:53:31.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:53:31.343000 audit: BPF prog-id=10 op=LOAD Sep 13 00:53:31.343000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:53:31.349000 audit: BPF prog-id=11 op=LOAD Sep 13 00:53:31.349000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:53:33.094000 audit[1068]: AVC avc: denied { associate } for pid=1068 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:53:33.094000 audit[1068]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024314 a1=c00002a3d8 a2=c000028840 a3=32 items=0 ppid=1051 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:33.094000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:53:33.101000 audit[1068]: AVC avc: denied { associate } for pid=1068 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:53:33.101000 audit[1068]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000243f9 a2=1ed a3=0 items=2 ppid=1051 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:33.101000 audit: CWD cwd="/" Sep 13 00:53:33.101000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:33.101000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:33.101000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:53:45.548000 audit: BPF prog-id=12 op=LOAD Sep 13 00:53:45.548000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:53:45.554000 audit: BPF prog-id=13 op=LOAD Sep 13 00:53:45.559000 audit: BPF prog-id=14 op=LOAD Sep 13 00:53:45.559000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:53:45.559000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:53:45.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:45.610000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:53:45.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:45.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:45.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:45.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.079000 audit: BPF prog-id=15 op=LOAD Sep 13 00:53:46.079000 audit: BPF prog-id=16 op=LOAD Sep 13 00:53:46.079000 audit: BPF prog-id=17 op=LOAD Sep 13 00:53:46.079000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:53:46.079000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:53:46.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.282000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:53:46.282000 audit[1149]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc7e8e30f0 a2=4000 a3=7ffc7e8e318c items=0 ppid=1 pid=1149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:46.282000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:53:46.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:45.546859 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:53:32.982400 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:53:45.546872 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 00:53:33.013835 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:53:45.561524 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:53:33.013854 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:53:33.013885 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:53:33.013895 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:53:33.013934 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:53:33.013947 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:53:33.014154 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:53:33.014195 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:53:33.014208 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:53:33.073629 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:53:33.073692 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:53:33.073730 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:53:33.073746 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:53:33.073763 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:53:33.073776 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:53:41.375533 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:41.375774 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:41.375900 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:41.376122 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:53:41.376180 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:53:41.376244 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2025-09-13T00:53:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:53:46.294501 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:53:46.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.301064 systemd[1]: Started systemd-journald.service. Sep 13 00:53:46.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.303618 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:53:46.303775 systemd[1]: Finished modprobe@loop.service. Sep 13 00:53:46.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.306032 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:53:46.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.308592 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:53:46.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.311525 systemd[1]: Reached target network-pre.target. Sep 13 00:53:46.314910 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:53:46.318544 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:53:46.320864 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:53:46.368702 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:53:46.372396 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:53:46.375320 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:53:46.376698 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:53:46.378777 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:53:46.380068 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:53:46.385628 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:53:46.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.387875 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:53:46.390794 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:53:46.394183 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:53:46.412492 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:53:46.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.416092 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:53:46.429439 systemd-journald[1149]: Time spent on flushing to /var/log/journal/bff3936f212b4642bdeb56ad254ece48 is 17.035ms for 1134 entries. Sep 13 00:53:46.429439 systemd-journald[1149]: System Journal (/var/log/journal/bff3936f212b4642bdeb56ad254ece48) is 8.0M, max 2.6G, 2.6G free. Sep 13 00:53:46.503731 systemd-journald[1149]: Received client request to flush runtime journal. Sep 13 00:53:46.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.451563 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:53:46.504617 udevadm[1191]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 13 00:53:46.454524 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:53:46.504773 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:53:46.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:46.623091 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:53:46.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:47.383875 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:53:47.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:48.164264 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:53:48.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:48.167000 audit: BPF prog-id=18 op=LOAD Sep 13 00:53:48.167000 audit: BPF prog-id=19 op=LOAD Sep 13 00:53:48.167000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:53:48.167000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:53:48.167745 systemd[1]: Starting systemd-udevd.service... Sep 13 00:53:48.185065 systemd-udevd[1194]: Using default interface naming scheme 'v252'. Sep 13 00:53:49.516777 systemd[1]: Started systemd-udevd.service. Sep 13 00:53:49.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:49.520000 audit: BPF prog-id=20 op=LOAD Sep 13 00:53:49.521214 systemd[1]: Starting systemd-networkd.service... Sep 13 00:53:49.556204 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:53:49.618109 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:53:49.629000 audit[1207]: AVC avc: denied { confidentiality } for pid=1207 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:53:49.636068 kernel: hv_vmbus: registering driver hv_balloon Sep 13 00:53:49.642094 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 00:53:49.629000 audit[1207]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cb4647a020 a1=f83c a2=7f7941f78bc5 a3=5 items=12 ppid=1194 pid=1207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:49.629000 audit: CWD cwd="/" Sep 13 00:53:49.629000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=1 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=2 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=3 name=(null) inode=15733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=4 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=5 name=(null) inode=15734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=6 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=7 name=(null) inode=15735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=8 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=9 name=(null) inode=15736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=10 name=(null) inode=15732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PATH item=11 name=(null) inode=15737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:49.629000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:53:49.662288 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 00:53:49.662362 kernel: hv_vmbus: registering driver hv_utils Sep 13 00:53:49.680151 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 00:53:49.680222 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 00:53:49.680249 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 00:53:49.680271 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 00:53:49.941215 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 00:53:49.947470 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 00:53:49.951350 kernel: Console: switching to colour dummy device 80x25 Sep 13 00:53:49.957235 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 00:53:50.013000 audit: BPF prog-id=21 op=LOAD Sep 13 00:53:50.013000 audit: BPF prog-id=22 op=LOAD Sep 13 00:53:50.013000 audit: BPF prog-id=23 op=LOAD Sep 13 00:53:50.014408 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:53:50.023225 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#139 cmd 0x85 status: scsi 0x2 srb 0x6 hv 0xc0000001 Sep 13 00:53:50.076841 systemd[1]: Started systemd-userdbd.service. Sep 13 00:53:50.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.324230 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Sep 13 00:53:50.356524 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:53:50.461578 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:53:50.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.465050 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:53:50.868402 lvm[1272]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:53:50.875553 systemd-networkd[1201]: lo: Link UP Sep 13 00:53:50.875563 systemd-networkd[1201]: lo: Gained carrier Sep 13 00:53:50.876099 systemd-networkd[1201]: Enumeration completed Sep 13 00:53:50.876234 systemd[1]: Started systemd-networkd.service. Sep 13 00:53:50.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.879975 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:53:50.881711 kernel: kauditd_printk_skb: 66 callbacks suppressed Sep 13 00:53:50.881749 kernel: audit: type=1130 audit(1757724830.878:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.912432 systemd-networkd[1201]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:53:50.932106 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:53:50.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.934940 systemd[1]: Reached target cryptsetup.target. Sep 13 00:53:50.947220 kernel: audit: type=1130 audit(1757724830.934:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.950011 systemd[1]: Starting lvm2-activation.service... Sep 13 00:53:50.954628 lvm[1274]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:53:50.960232 kernel: mlx5_core b3f3:00:02.0 enP46067s1: Link up Sep 13 00:53:50.965235 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 00:53:50.976042 systemd[1]: Finished lvm2-activation.service. Sep 13 00:53:50.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.978618 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:53:50.990217 kernel: audit: type=1130 audit(1757724830.978:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:50.990256 kernel: hv_netvsc 6045bdd2-6538-6045-bdd2-65386045bdd2 eth0: Data path switched to VF: enP46067s1 Sep 13 00:53:50.995012 systemd-networkd[1201]: enP46067s1: Link UP Sep 13 00:53:50.995133 systemd-networkd[1201]: eth0: Link UP Sep 13 00:53:50.995136 systemd-networkd[1201]: eth0: Gained carrier Sep 13 00:53:50.996646 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:53:50.996678 systemd[1]: Reached target local-fs.target. Sep 13 00:53:50.998974 systemd[1]: Reached target machines.target. Sep 13 00:53:51.002250 systemd[1]: Starting ldconfig.service... Sep 13 00:53:51.006500 systemd-networkd[1201]: enP46067s1: Gained carrier Sep 13 00:53:51.014319 systemd-networkd[1201]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:53:51.035003 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:51.035082 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:51.036166 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:53:51.039425 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:53:51.043594 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:53:51.047018 systemd[1]: Starting systemd-sysext.service... Sep 13 00:53:51.308653 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1276 (bootctl) Sep 13 00:53:51.309884 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:53:51.659438 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:53:51.751011 kernel: audit: type=1130 audit(1757724831.662:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:51.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:51.770051 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:53:51.804766 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:53:51.804975 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:53:51.855305 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:53:51.856551 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:53:51.862223 kernel: loop0: detected capacity change from 0 to 229808 Sep 13 00:53:51.864951 kernel: audit: type=1130 audit(1757724831.862:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:51.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:51.937315 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:53:51.955237 kernel: loop1: detected capacity change from 0 to 229808 Sep 13 00:53:51.964315 (sd-sysext)[1288]: Using extensions 'kubernetes'. Sep 13 00:53:51.964720 (sd-sysext)[1288]: Merged extensions into '/usr'. Sep 13 00:53:51.979473 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:51.980827 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:53:51.983061 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:51.985746 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:53:51.989525 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:53:51.993444 systemd[1]: Starting modprobe@loop.service... Sep 13 00:53:51.995610 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:51.995825 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:51.996033 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:51.998699 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:53:52.001189 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:53:52.001346 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:53:52.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.004235 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:53:52.004372 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:53:52.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.016232 kernel: audit: type=1130 audit(1757724832.003:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.016273 kernel: audit: type=1131 audit(1757724832.003:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.030713 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:53:52.030846 systemd[1]: Finished modprobe@loop.service. Sep 13 00:53:52.031419 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:53:52.031524 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:53:52.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.046381 systemd[1]: Finished systemd-sysext.service. Sep 13 00:53:52.059219 kernel: audit: type=1130 audit(1757724832.029:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.059348 kernel: audit: type=1131 audit(1757724832.029:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.059380 kernel: audit: type=1130 audit(1757724832.029:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.077438 systemd[1]: Starting ensure-sysext.service... Sep 13 00:53:52.081025 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:53:52.087590 systemd[1]: Reloading. Sep 13 00:53:52.132896 /usr/lib/systemd/system-generators/torcx-generator[1315]: time="2025-09-13T00:53:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:53:52.135147 /usr/lib/systemd/system-generators/torcx-generator[1315]: time="2025-09-13T00:53:52Z" level=info msg="torcx already run" Sep 13 00:53:52.229927 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:53:52.229946 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:53:52.244417 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:53:52.301000 audit: BPF prog-id=24 op=LOAD Sep 13 00:53:52.301000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:53:52.301000 audit: BPF prog-id=25 op=LOAD Sep 13 00:53:52.301000 audit: BPF prog-id=26 op=LOAD Sep 13 00:53:52.301000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:53:52.301000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:53:52.303000 audit: BPF prog-id=27 op=LOAD Sep 13 00:53:52.303000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:53:52.303000 audit: BPF prog-id=28 op=LOAD Sep 13 00:53:52.303000 audit: BPF prog-id=29 op=LOAD Sep 13 00:53:52.303000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:53:52.303000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:53:52.304000 audit: BPF prog-id=30 op=LOAD Sep 13 00:53:52.304000 audit: BPF prog-id=31 op=LOAD Sep 13 00:53:52.304000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:53:52.304000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:53:52.305000 audit: BPF prog-id=32 op=LOAD Sep 13 00:53:52.306000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:53:52.318226 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:52.318471 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:52.319674 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:53:52.321595 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:53:52.323859 systemd[1]: Starting modprobe@loop.service... Sep 13 00:53:52.324014 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:52.324232 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:52.324422 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:52.330831 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:53:52.330992 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:53:52.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.331539 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:53:52.331658 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:53:52.332364 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:53:52.332469 systemd[1]: Finished modprobe@loop.service. Sep 13 00:53:52.333992 systemd[1]: Finished ensure-sysext.service. Sep 13 00:53:52.335638 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:52.335851 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:53:52.339748 systemd[1]: Starting modprobe@drm.service... Sep 13 00:53:52.339974 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:53:52.340051 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:53:52.340114 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:53:52.340158 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:53:52.340251 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:53:52.342843 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:53:52.343024 systemd[1]: Finished modprobe@drm.service. Sep 13 00:53:52.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:52.474656 systemd-tmpfiles[1295]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:53:52.739369 systemd-tmpfiles[1295]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:53:52.786350 systemd-networkd[1201]: eth0: Gained IPv6LL Sep 13 00:53:52.790956 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:53:52.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:53.022880 systemd-tmpfiles[1295]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:53:53.200691 systemd-fsck[1283]: fsck.fat 4.2 (2021-01-31) Sep 13 00:53:53.200691 systemd-fsck[1283]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 00:53:53.202759 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:53:53.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:53.207195 systemd[1]: Mounting boot.mount... Sep 13 00:53:53.253765 systemd[1]: Mounted boot.mount. Sep 13 00:53:53.270889 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:53:53.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.418237 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:53:56.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.422714 systemd[1]: Starting audit-rules.service... Sep 13 00:53:56.424956 kernel: kauditd_printk_skb: 32 callbacks suppressed Sep 13 00:53:56.425046 kernel: audit: type=1130 audit(1757724836.420:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.442737 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:53:56.445980 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:53:56.449000 audit: BPF prog-id=33 op=LOAD Sep 13 00:53:56.451009 systemd[1]: Starting systemd-resolved.service... Sep 13 00:53:56.456232 kernel: audit: type=1334 audit(1757724836.449:190): prog-id=33 op=LOAD Sep 13 00:53:56.458000 audit: BPF prog-id=34 op=LOAD Sep 13 00:53:56.459547 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:53:56.464232 kernel: audit: type=1334 audit(1757724836.458:191): prog-id=34 op=LOAD Sep 13 00:53:56.466548 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:53:56.494000 audit[1392]: SYSTEM_BOOT pid=1392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.517250 kernel: audit: type=1127 audit(1757724836.494:192): pid=1392 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.520415 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:53:56.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.540217 kernel: audit: type=1130 audit(1757724836.522:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.542992 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:53:56.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.561468 kernel: audit: type=1130 audit(1757724836.545:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.545645 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:53:56.643695 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:53:56.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.646298 systemd[1]: Reached target time-set.target. Sep 13 00:53:56.663358 kernel: audit: type=1130 audit(1757724836.645:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.723848 systemd-resolved[1390]: Positive Trust Anchors: Sep 13 00:53:56.723867 systemd-resolved[1390]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:53:56.723902 systemd-resolved[1390]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:53:56.816809 systemd-timesyncd[1391]: Contacted time server 83.137.225.123:123 (0.flatcar.pool.ntp.org). Sep 13 00:53:56.816928 systemd-timesyncd[1391]: Initial clock synchronization to Sat 2025-09-13 00:53:56.815856 UTC. Sep 13 00:53:56.872861 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:53:56.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.889813 systemd-resolved[1390]: Using system hostname 'ci-3510.3.8-n-99b5c97c7e'. Sep 13 00:53:56.891906 systemd[1]: Started systemd-resolved.service. Sep 13 00:53:56.894477 kernel: audit: type=1130 audit(1757724836.875:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.894640 systemd[1]: Reached target network.target. Sep 13 00:53:56.909222 kernel: audit: type=1130 audit(1757724836.894:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:53:56.910762 systemd[1]: Reached target network-online.target. Sep 13 00:53:56.913276 systemd[1]: Reached target nss-lookup.target. Sep 13 00:53:57.027000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:53:57.028117 systemd[1]: Finished audit-rules.service. Sep 13 00:53:57.028500 augenrules[1407]: No rules Sep 13 00:53:57.038233 kernel: audit: type=1305 audit(1757724837.027:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:53:57.027000 audit[1407]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcc3e31740 a2=420 a3=0 items=0 ppid=1386 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:57.027000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:54:02.281095 ldconfig[1275]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:54:02.289848 systemd[1]: Finished ldconfig.service. Sep 13 00:54:02.293732 systemd[1]: Starting systemd-update-done.service... Sep 13 00:54:02.316529 systemd[1]: Finished systemd-update-done.service. Sep 13 00:54:02.319297 systemd[1]: Reached target sysinit.target. Sep 13 00:54:02.321695 systemd[1]: Started motdgen.path. Sep 13 00:54:02.323527 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:54:02.326421 systemd[1]: Started logrotate.timer. Sep 13 00:54:02.328297 systemd[1]: Started mdadm.timer. Sep 13 00:54:02.330080 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:54:02.332251 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:54:02.332288 systemd[1]: Reached target paths.target. Sep 13 00:54:02.334269 systemd[1]: Reached target timers.target. Sep 13 00:54:02.336493 systemd[1]: Listening on dbus.socket. Sep 13 00:54:02.339451 systemd[1]: Starting docker.socket... Sep 13 00:54:02.384747 systemd[1]: Listening on sshd.socket. Sep 13 00:54:02.387334 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:02.387784 systemd[1]: Listening on docker.socket. Sep 13 00:54:02.390166 systemd[1]: Reached target sockets.target. Sep 13 00:54:02.392452 systemd[1]: Reached target basic.target. Sep 13 00:54:02.394730 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:54:02.394770 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:54:02.395718 systemd[1]: Starting containerd.service... Sep 13 00:54:02.398912 systemd[1]: Starting dbus.service... Sep 13 00:54:02.401707 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:54:02.405045 systemd[1]: Starting extend-filesystems.service... Sep 13 00:54:02.407196 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:54:02.431199 systemd[1]: Starting kubelet.service... Sep 13 00:54:02.434564 systemd[1]: Starting motdgen.service... Sep 13 00:54:02.437631 systemd[1]: Started nvidia.service. Sep 13 00:54:02.440757 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:54:02.444215 systemd[1]: Starting sshd-keygen.service... Sep 13 00:54:02.448524 systemd[1]: Starting systemd-logind.service... Sep 13 00:54:02.450906 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:54:02.451004 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:54:02.451533 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:54:02.452384 systemd[1]: Starting update-engine.service... Sep 13 00:54:02.456058 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:54:02.473668 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:54:02.473869 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:54:02.536080 jq[1428]: true Sep 13 00:54:02.536407 jq[1417]: false Sep 13 00:54:02.536623 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:54:02.536810 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:54:02.550081 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:54:02.550338 systemd[1]: Finished motdgen.service. Sep 13 00:54:02.571624 jq[1437]: true Sep 13 00:54:02.598150 extend-filesystems[1418]: Found loop1 Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda1 Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda2 Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda3 Sep 13 00:54:02.598150 extend-filesystems[1418]: Found usr Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda4 Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda6 Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda7 Sep 13 00:54:02.598150 extend-filesystems[1418]: Found sda9 Sep 13 00:54:02.598150 extend-filesystems[1418]: Checking size of /dev/sda9 Sep 13 00:54:02.611960 systemd-logind[1426]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:54:02.627800 env[1438]: time="2025-09-13T00:54:02.618537678Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:54:02.612129 systemd-logind[1426]: New seat seat0. Sep 13 00:54:02.700031 env[1438]: time="2025-09-13T00:54:02.699983047Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:54:02.700333 env[1438]: time="2025-09-13T00:54:02.700309234Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:02.702229 env[1438]: time="2025-09-13T00:54:02.702167960Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:54:02.702350 env[1438]: time="2025-09-13T00:54:02.702333153Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:02.702647 env[1438]: time="2025-09-13T00:54:02.702624342Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:54:02.702728 env[1438]: time="2025-09-13T00:54:02.702713538Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:02.702789 env[1438]: time="2025-09-13T00:54:02.702775636Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:54:02.702843 env[1438]: time="2025-09-13T00:54:02.702831134Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:02.702978 env[1438]: time="2025-09-13T00:54:02.702963428Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:02.707563 extend-filesystems[1418]: Old size kept for /dev/sda9 Sep 13 00:54:02.710311 extend-filesystems[1418]: Found sr0 Sep 13 00:54:02.715828 env[1438]: time="2025-09-13T00:54:02.712369155Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:54:02.715828 env[1438]: time="2025-09-13T00:54:02.712549048Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:54:02.715828 env[1438]: time="2025-09-13T00:54:02.712572647Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:54:02.715828 env[1438]: time="2025-09-13T00:54:02.712647844Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:54:02.715828 env[1438]: time="2025-09-13T00:54:02.712662943Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:54:02.717498 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:54:02.717686 systemd[1]: Finished extend-filesystems.service. Sep 13 00:54:02.734774 env[1438]: time="2025-09-13T00:54:02.734742767Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:54:02.734855 env[1438]: time="2025-09-13T00:54:02.734783966Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:54:02.734855 env[1438]: time="2025-09-13T00:54:02.734803665Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:54:02.734931 env[1438]: time="2025-09-13T00:54:02.734859663Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.734931 env[1438]: time="2025-09-13T00:54:02.734882362Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735000 env[1438]: time="2025-09-13T00:54:02.734940959Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735000 env[1438]: time="2025-09-13T00:54:02.734962359Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735000 env[1438]: time="2025-09-13T00:54:02.734982658Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735093 env[1438]: time="2025-09-13T00:54:02.735006557Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735093 env[1438]: time="2025-09-13T00:54:02.735026656Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735093 env[1438]: time="2025-09-13T00:54:02.735045555Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735093 env[1438]: time="2025-09-13T00:54:02.735064354Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:54:02.735250 env[1438]: time="2025-09-13T00:54:02.735169550Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:54:02.735286 env[1438]: time="2025-09-13T00:54:02.735270146Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:54:02.735640 env[1438]: time="2025-09-13T00:54:02.735619532Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:54:02.735691 env[1438]: time="2025-09-13T00:54:02.735658031Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735691 env[1438]: time="2025-09-13T00:54:02.735678830Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:54:02.735764 env[1438]: time="2025-09-13T00:54:02.735737328Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735764 env[1438]: time="2025-09-13T00:54:02.735757627Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735829 env[1438]: time="2025-09-13T00:54:02.735775626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735829 env[1438]: time="2025-09-13T00:54:02.735792426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735829 env[1438]: time="2025-09-13T00:54:02.735809225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735926 env[1438]: time="2025-09-13T00:54:02.735826324Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735926 env[1438]: time="2025-09-13T00:54:02.735845623Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735926 env[1438]: time="2025-09-13T00:54:02.735863123Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.735926 env[1438]: time="2025-09-13T00:54:02.735881922Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:54:02.736058 env[1438]: time="2025-09-13T00:54:02.736015317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.736058 env[1438]: time="2025-09-13T00:54:02.736034916Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.736058 env[1438]: time="2025-09-13T00:54:02.736053015Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.736153 env[1438]: time="2025-09-13T00:54:02.736069315Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:54:02.736153 env[1438]: time="2025-09-13T00:54:02.736090414Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:54:02.736153 env[1438]: time="2025-09-13T00:54:02.736106513Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:54:02.736153 env[1438]: time="2025-09-13T00:54:02.736130112Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:54:02.736316 env[1438]: time="2025-09-13T00:54:02.736172611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:54:02.736528 env[1438]: time="2025-09-13T00:54:02.736453099Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:54:02.738159 systemd[1]: Started containerd.service. Sep 13 00:54:02.813498 bash[1462]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.736546696Z" level=info msg="Connect containerd service" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.736588594Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.737717249Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.737991238Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.738042036Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.738098734Z" level=info msg="containerd successfully booted in 0.120469s" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.770346554Z" level=info msg="Start subscribing containerd event" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.770489449Z" level=info msg="Start recovering state" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.770583445Z" level=info msg="Start event monitor" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.770603344Z" level=info msg="Start snapshots syncer" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.770621944Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:54:02.813606 env[1438]: time="2025-09-13T00:54:02.770635743Z" level=info msg="Start streaming server" Sep 13 00:54:02.805816 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:54:02.942385 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:54:03.254703 dbus-daemon[1416]: [system] SELinux support is enabled Sep 13 00:54:03.254881 systemd[1]: Started dbus.service. Sep 13 00:54:03.259213 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:54:03.259241 systemd[1]: Reached target system-config.target. Sep 13 00:54:03.262116 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:54:03.262139 systemd[1]: Reached target user-config.target. Sep 13 00:54:03.266708 systemd[1]: Started systemd-logind.service. Sep 13 00:54:03.269517 dbus-daemon[1416]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:54:03.584468 update_engine[1427]: I0913 00:54:03.566143 1427 main.cc:92] Flatcar Update Engine starting Sep 13 00:54:03.665210 systemd[1]: Started update-engine.service. Sep 13 00:54:03.665856 update_engine[1427]: I0913 00:54:03.665759 1427 update_check_scheduler.cc:74] Next update check in 7m12s Sep 13 00:54:03.669860 systemd[1]: Started locksmithd.service. Sep 13 00:54:03.803597 systemd[1]: Started kubelet.service. Sep 13 00:54:03.962267 sshd_keygen[1434]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:54:03.990772 systemd[1]: Finished sshd-keygen.service. Sep 13 00:54:03.994942 systemd[1]: Starting issuegen.service... Sep 13 00:54:03.998251 systemd[1]: Started waagent.service. Sep 13 00:54:04.005997 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:54:04.006152 systemd[1]: Finished issuegen.service. Sep 13 00:54:04.009810 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:54:04.035760 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:54:04.040083 systemd[1]: Started getty@tty1.service. Sep 13 00:54:04.043729 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:54:04.046375 systemd[1]: Reached target getty.target. Sep 13 00:54:04.048814 systemd[1]: Reached target multi-user.target. Sep 13 00:54:04.052826 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:54:04.062442 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:54:04.062632 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:54:04.065724 systemd[1]: Startup finished in 884ms (kernel) + 14.102s (initrd) + 34.006s (userspace) = 48.993s. Sep 13 00:54:04.534194 kubelet[1523]: E0913 00:54:04.534141 1523 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:04.535819 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:04.535986 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:04.536264 systemd[1]: kubelet.service: Consumed 1.123s CPU time. Sep 13 00:54:04.952970 login[1542]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:54:04.954452 login[1543]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:54:05.170470 systemd[1]: Created slice user-500.slice. Sep 13 00:54:05.171806 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:54:05.174258 systemd-logind[1426]: New session 2 of user core. Sep 13 00:54:05.177562 systemd-logind[1426]: New session 1 of user core. Sep 13 00:54:05.208485 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:54:05.210113 systemd[1]: Starting user@500.service... Sep 13 00:54:05.242667 (systemd)[1550]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:05.354334 locksmithd[1520]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:54:05.687054 systemd[1550]: Queued start job for default target default.target. Sep 13 00:54:05.687651 systemd[1550]: Reached target paths.target. Sep 13 00:54:05.687679 systemd[1550]: Reached target sockets.target. Sep 13 00:54:05.687695 systemd[1550]: Reached target timers.target. Sep 13 00:54:05.687709 systemd[1550]: Reached target basic.target. Sep 13 00:54:05.687824 systemd[1]: Started user@500.service. Sep 13 00:54:05.688946 systemd[1]: Started session-1.scope. Sep 13 00:54:05.689586 systemd[1550]: Reached target default.target. Sep 13 00:54:05.689680 systemd[1]: Started session-2.scope. Sep 13 00:54:05.689805 systemd[1550]: Startup finished in 440ms. Sep 13 00:54:14.630430 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:54:14.630668 systemd[1]: Stopped kubelet.service. Sep 13 00:54:14.630720 systemd[1]: kubelet.service: Consumed 1.123s CPU time. Sep 13 00:54:14.632331 systemd[1]: Starting kubelet.service... Sep 13 00:54:14.789539 systemd[1]: Started kubelet.service. Sep 13 00:54:15.424934 kubelet[1576]: E0913 00:54:15.424885 1576 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:15.427963 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:15.428127 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:15.494497 waagent[1537]: 2025-09-13T00:54:15.494389Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 00:54:15.536237 waagent[1537]: 2025-09-13T00:54:15.524597Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 00:54:15.536237 waagent[1537]: 2025-09-13T00:54:15.525561Z INFO Daemon Daemon Python: 3.9.16 Sep 13 00:54:15.536237 waagent[1537]: 2025-09-13T00:54:15.526840Z INFO Daemon Daemon Run daemon Sep 13 00:54:15.536237 waagent[1537]: 2025-09-13T00:54:15.528165Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 00:54:15.553294 waagent[1537]: 2025-09-13T00:54:15.553143Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:54:15.560815 waagent[1537]: 2025-09-13T00:54:15.560699Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.561126Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.561920Z INFO Daemon Daemon Using waagent for provisioning Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.563506Z INFO Daemon Daemon Activate resource disk Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.564288Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.572732Z INFO Daemon Daemon Found device: None Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.573430Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.574372Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.576292Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.577282Z INFO Daemon Daemon Running default provisioning handler Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.587136Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.590469Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.591379Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 00:54:15.606290 waagent[1537]: 2025-09-13T00:54:15.592177Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 00:54:15.753921 waagent[1537]: 2025-09-13T00:54:15.753700Z INFO Daemon Daemon Successfully mounted dvd Sep 13 00:54:15.834438 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 00:54:15.939378 waagent[1537]: 2025-09-13T00:54:15.939225Z INFO Daemon Daemon Detect protocol endpoint Sep 13 00:54:15.942179 waagent[1537]: 2025-09-13T00:54:15.942116Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 00:54:15.945519 waagent[1537]: 2025-09-13T00:54:15.945463Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 00:54:15.949741 waagent[1537]: 2025-09-13T00:54:15.949688Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 00:54:15.953096 waagent[1537]: 2025-09-13T00:54:15.953040Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 00:54:15.955962 waagent[1537]: 2025-09-13T00:54:15.955906Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 00:54:16.108754 waagent[1537]: 2025-09-13T00:54:16.108629Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 00:54:16.116573 waagent[1537]: 2025-09-13T00:54:16.109617Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 00:54:16.116573 waagent[1537]: 2025-09-13T00:54:16.110400Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 00:54:16.687953 waagent[1537]: 2025-09-13T00:54:16.687806Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 00:54:16.697891 waagent[1537]: 2025-09-13T00:54:16.697826Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 00:54:16.703441 waagent[1537]: 2025-09-13T00:54:16.698163Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 00:54:16.777443 waagent[1537]: 2025-09-13T00:54:16.777318Z INFO Daemon Daemon Found private key matching thumbprint 51ED82FFB4C0871E2E122E522100FB9C9C388EC2 Sep 13 00:54:16.782068 waagent[1537]: 2025-09-13T00:54:16.782001Z INFO Daemon Daemon Fetch goal state completed Sep 13 00:54:16.803851 waagent[1537]: 2025-09-13T00:54:16.803796Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: a4079fcd-7f43-469c-9794-606c274abb3e New eTag: 7043390606288462771] Sep 13 00:54:16.809407 waagent[1537]: 2025-09-13T00:54:16.809350Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:54:16.819602 waagent[1537]: 2025-09-13T00:54:16.819538Z INFO Daemon Daemon Starting provisioning Sep 13 00:54:16.822517 waagent[1537]: 2025-09-13T00:54:16.822459Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 00:54:16.825088 waagent[1537]: 2025-09-13T00:54:16.825038Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-99b5c97c7e] Sep 13 00:54:16.845296 waagent[1537]: 2025-09-13T00:54:16.845157Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-99b5c97c7e] Sep 13 00:54:16.849514 waagent[1537]: 2025-09-13T00:54:16.849448Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 00:54:16.853165 waagent[1537]: 2025-09-13T00:54:16.853108Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 00:54:16.866612 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 00:54:16.866843 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 00:54:16.866915 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 00:54:16.867226 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:54:16.872257 systemd-networkd[1201]: eth0: DHCPv6 lease lost Sep 13 00:54:16.873411 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:54:16.873563 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:54:16.875660 systemd[1]: Starting systemd-networkd.service... Sep 13 00:54:16.905664 systemd-networkd[1604]: enP46067s1: Link UP Sep 13 00:54:16.905675 systemd-networkd[1604]: enP46067s1: Gained carrier Sep 13 00:54:16.907002 systemd-networkd[1604]: eth0: Link UP Sep 13 00:54:16.907012 systemd-networkd[1604]: eth0: Gained carrier Sep 13 00:54:16.907525 systemd-networkd[1604]: lo: Link UP Sep 13 00:54:16.907535 systemd-networkd[1604]: lo: Gained carrier Sep 13 00:54:16.907835 systemd-networkd[1604]: eth0: Gained IPv6LL Sep 13 00:54:16.908803 systemd-networkd[1604]: Enumeration completed Sep 13 00:54:16.908893 systemd[1]: Started systemd-networkd.service. Sep 13 00:54:16.913365 waagent[1537]: 2025-09-13T00:54:16.910115Z INFO Daemon Daemon Create user account if not exists Sep 13 00:54:16.913365 waagent[1537]: 2025-09-13T00:54:16.911283Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 00:54:16.913365 waagent[1537]: 2025-09-13T00:54:16.912032Z INFO Daemon Daemon Configure sudoer Sep 13 00:54:16.919354 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:54:16.920834 systemd-networkd[1604]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:54:16.928311 waagent[1537]: 2025-09-13T00:54:16.928199Z INFO Daemon Daemon Configure sshd Sep 13 00:54:16.931023 waagent[1537]: 2025-09-13T00:54:16.930966Z INFO Daemon Daemon Deploy ssh public key. Sep 13 00:54:16.934777 systemd-networkd[1604]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 Sep 13 00:54:16.938085 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:54:18.115940 waagent[1537]: 2025-09-13T00:54:18.115853Z INFO Daemon Daemon Provisioning complete Sep 13 00:54:18.128401 waagent[1537]: 2025-09-13T00:54:18.128340Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 00:54:18.131930 waagent[1537]: 2025-09-13T00:54:18.131864Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 00:54:18.137193 waagent[1537]: 2025-09-13T00:54:18.137134Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 00:54:18.398586 waagent[1610]: 2025-09-13T00:54:18.398495Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 00:54:18.399364 waagent[1610]: 2025-09-13T00:54:18.399305Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:18.399504 waagent[1610]: 2025-09-13T00:54:18.399457Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:18.410223 waagent[1610]: 2025-09-13T00:54:18.410134Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 00:54:18.410382 waagent[1610]: 2025-09-13T00:54:18.410324Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 00:54:18.457490 waagent[1610]: 2025-09-13T00:54:18.457370Z INFO ExtHandler ExtHandler Found private key matching thumbprint 51ED82FFB4C0871E2E122E522100FB9C9C388EC2 Sep 13 00:54:18.457781 waagent[1610]: 2025-09-13T00:54:18.457724Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 00:54:18.469101 waagent[1610]: 2025-09-13T00:54:18.469042Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 174e6688-bba3-4fab-9e28-86fb6b7b3d2e New eTag: 7043390606288462771] Sep 13 00:54:18.469603 waagent[1610]: 2025-09-13T00:54:18.469548Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 00:54:18.594120 waagent[1610]: 2025-09-13T00:54:18.593982Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:54:18.618073 waagent[1610]: 2025-09-13T00:54:18.617991Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1610 Sep 13 00:54:18.621409 waagent[1610]: 2025-09-13T00:54:18.621346Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:54:18.622542 waagent[1610]: 2025-09-13T00:54:18.622486Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 00:54:18.806755 waagent[1610]: 2025-09-13T00:54:18.806642Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:54:18.807096 waagent[1610]: 2025-09-13T00:54:18.807039Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:54:18.814483 waagent[1610]: 2025-09-13T00:54:18.814428Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:54:18.814935 waagent[1610]: 2025-09-13T00:54:18.814880Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:54:18.815950 waagent[1610]: 2025-09-13T00:54:18.815891Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 00:54:18.817183 waagent[1610]: 2025-09-13T00:54:18.817127Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:54:18.817935 waagent[1610]: 2025-09-13T00:54:18.817885Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:18.818106 waagent[1610]: 2025-09-13T00:54:18.818056Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:54:18.818802 waagent[1610]: 2025-09-13T00:54:18.818746Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:54:18.818942 waagent[1610]: 2025-09-13T00:54:18.818869Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:18.819039 waagent[1610]: 2025-09-13T00:54:18.818965Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:54:18.819948 waagent[1610]: 2025-09-13T00:54:18.819893Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:54:18.820679 waagent[1610]: 2025-09-13T00:54:18.820626Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:54:18.820882 waagent[1610]: 2025-09-13T00:54:18.820830Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:54:18.821066 waagent[1610]: 2025-09-13T00:54:18.821021Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:18.821332 waagent[1610]: 2025-09-13T00:54:18.821282Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:54:18.821332 waagent[1610]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:54:18.821332 waagent[1610]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:54:18.821332 waagent[1610]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:54:18.821332 waagent[1610]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:18.821332 waagent[1610]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:18.821332 waagent[1610]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:18.822464 waagent[1610]: 2025-09-13T00:54:18.822417Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:18.825807 waagent[1610]: 2025-09-13T00:54:18.825620Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:54:18.826221 waagent[1610]: 2025-09-13T00:54:18.826146Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:54:18.826772 waagent[1610]: 2025-09-13T00:54:18.826718Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:54:18.827435 waagent[1610]: 2025-09-13T00:54:18.827388Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:54:18.835042 waagent[1610]: 2025-09-13T00:54:18.834995Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 00:54:18.837034 waagent[1610]: 2025-09-13T00:54:18.836988Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:54:18.839962 waagent[1610]: 2025-09-13T00:54:18.839905Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 00:54:18.857502 waagent[1610]: 2025-09-13T00:54:18.857449Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 00:54:18.882058 waagent[1610]: 2025-09-13T00:54:18.881976Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1604' Sep 13 00:54:19.023932 waagent[1610]: 2025-09-13T00:54:19.023814Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:54:19.023932 waagent[1610]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:54:19.023932 waagent[1610]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:54:19.023932 waagent[1610]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d2:65:38 brd ff:ff:ff:ff:ff:ff Sep 13 00:54:19.023932 waagent[1610]: 3: enP46067s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d2:65:38 brd ff:ff:ff:ff:ff:ff\ altname enP46067p0s2 Sep 13 00:54:19.023932 waagent[1610]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:54:19.023932 waagent[1610]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:54:19.023932 waagent[1610]: 2: eth0 inet 10.200.4.18/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:54:19.023932 waagent[1610]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:54:19.023932 waagent[1610]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:54:19.023932 waagent[1610]: 2: eth0 inet6 fe80::6245:bdff:fed2:6538/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:54:19.183559 waagent[1610]: 2025-09-13T00:54:19.183482Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 00:54:20.141494 waagent[1537]: 2025-09-13T00:54:20.141346Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 00:54:20.146448 waagent[1537]: 2025-09-13T00:54:20.146392Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 00:54:21.308748 waagent[1638]: 2025-09-13T00:54:21.308643Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 00:54:21.309486 waagent[1638]: 2025-09-13T00:54:21.309418Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 00:54:21.309649 waagent[1638]: 2025-09-13T00:54:21.309598Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 00:54:21.309794 waagent[1638]: 2025-09-13T00:54:21.309750Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Sep 13 00:54:21.324379 waagent[1638]: 2025-09-13T00:54:21.324274Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 00:54:21.324787 waagent[1638]: 2025-09-13T00:54:21.324728Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:21.324960 waagent[1638]: 2025-09-13T00:54:21.324912Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:21.325181 waagent[1638]: 2025-09-13T00:54:21.325133Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 00:54:21.336704 waagent[1638]: 2025-09-13T00:54:21.336632Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 00:54:21.351268 waagent[1638]: 2025-09-13T00:54:21.351193Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.177 Sep 13 00:54:21.352153 waagent[1638]: 2025-09-13T00:54:21.352098Z INFO ExtHandler Sep 13 00:54:21.352328 waagent[1638]: 2025-09-13T00:54:21.352279Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 315d2024-a7bc-4cb6-9ad5-b07ae76fdf77 eTag: 7043390606288462771 source: Fabric] Sep 13 00:54:21.352992 waagent[1638]: 2025-09-13T00:54:21.352937Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 00:54:21.354068 waagent[1638]: 2025-09-13T00:54:21.354010Z INFO ExtHandler Sep 13 00:54:21.354232 waagent[1638]: 2025-09-13T00:54:21.354165Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 00:54:21.359620 waagent[1638]: 2025-09-13T00:54:21.359566Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 00:54:21.360076 waagent[1638]: 2025-09-13T00:54:21.360028Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 00:54:21.375330 waagent[1638]: 2025-09-13T00:54:21.375277Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 00:54:21.424376 waagent[1638]: 2025-09-13T00:54:21.424259Z INFO ExtHandler Downloaded certificate {'thumbprint': '51ED82FFB4C0871E2E122E522100FB9C9C388EC2', 'hasPrivateKey': True} Sep 13 00:54:21.425616 waagent[1638]: 2025-09-13T00:54:21.425549Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 00:54:21.426455 waagent[1638]: 2025-09-13T00:54:21.426402Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 00:54:21.440494 waagent[1638]: 2025-09-13T00:54:21.440400Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 00:54:21.447795 waagent[1638]: 2025-09-13T00:54:21.447704Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:54:21.451138 waagent[1638]: 2025-09-13T00:54:21.451046Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 00:54:21.451376 waagent[1638]: 2025-09-13T00:54:21.451324Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 00:54:21.605444 waagent[1638]: 2025-09-13T00:54:21.605277Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Sep 13 00:54:21.605444 waagent[1638]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:21.605444 waagent[1638]: pkts bytes target prot opt in out source destination Sep 13 00:54:21.605444 waagent[1638]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:21.605444 waagent[1638]: pkts bytes target prot opt in out source destination Sep 13 00:54:21.605444 waagent[1638]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 00:54:21.605444 waagent[1638]: pkts bytes target prot opt in out source destination Sep 13 00:54:21.605444 waagent[1638]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 00:54:21.605444 waagent[1638]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 00:54:21.605444 waagent[1638]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 00:54:21.606508 waagent[1638]: 2025-09-13T00:54:21.606443Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 00:54:21.608990 waagent[1638]: 2025-09-13T00:54:21.608889Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 00:54:21.609271 waagent[1638]: 2025-09-13T00:54:21.609198Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 00:54:21.609639 waagent[1638]: 2025-09-13T00:54:21.609584Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 00:54:21.617040 waagent[1638]: 2025-09-13T00:54:21.616984Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 00:54:21.617523 waagent[1638]: 2025-09-13T00:54:21.617470Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 00:54:21.624835 waagent[1638]: 2025-09-13T00:54:21.624766Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1638 Sep 13 00:54:21.627760 waagent[1638]: 2025-09-13T00:54:21.627695Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 00:54:21.628497 waagent[1638]: 2025-09-13T00:54:21.628439Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 00:54:21.629272 waagent[1638]: 2025-09-13T00:54:21.629198Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 00:54:21.631723 waagent[1638]: 2025-09-13T00:54:21.631663Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 00:54:21.632041 waagent[1638]: 2025-09-13T00:54:21.631987Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 00:54:21.633306 waagent[1638]: 2025-09-13T00:54:21.633252Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 00:54:21.633704 waagent[1638]: 2025-09-13T00:54:21.633651Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:21.633872 waagent[1638]: 2025-09-13T00:54:21.633827Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:21.634398 waagent[1638]: 2025-09-13T00:54:21.634348Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 00:54:21.634919 waagent[1638]: 2025-09-13T00:54:21.634869Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 00:54:21.635241 waagent[1638]: 2025-09-13T00:54:21.635176Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 00:54:21.635241 waagent[1638]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 00:54:21.635241 waagent[1638]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 00:54:21.635241 waagent[1638]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 00:54:21.635241 waagent[1638]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:21.635241 waagent[1638]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:21.635241 waagent[1638]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 00:54:21.635851 waagent[1638]: 2025-09-13T00:54:21.635803Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 00:54:21.636030 waagent[1638]: 2025-09-13T00:54:21.635987Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 00:54:21.636422 waagent[1638]: 2025-09-13T00:54:21.636377Z INFO EnvHandler ExtHandler Configure routes Sep 13 00:54:21.636607 waagent[1638]: 2025-09-13T00:54:21.636538Z INFO EnvHandler ExtHandler Gateway:None Sep 13 00:54:21.636813 waagent[1638]: 2025-09-13T00:54:21.636768Z INFO EnvHandler ExtHandler Routes:None Sep 13 00:54:21.640849 waagent[1638]: 2025-09-13T00:54:21.640795Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 00:54:21.641266 waagent[1638]: 2025-09-13T00:54:21.641186Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 00:54:21.644308 waagent[1638]: 2025-09-13T00:54:21.644239Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 00:54:21.644406 waagent[1638]: 2025-09-13T00:54:21.644054Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 00:54:21.654237 waagent[1638]: 2025-09-13T00:54:21.651281Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 00:54:21.663543 waagent[1638]: 2025-09-13T00:54:21.663439Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 00:54:21.663543 waagent[1638]: Executing ['ip', '-a', '-o', 'link']: Sep 13 00:54:21.663543 waagent[1638]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 00:54:21.663543 waagent[1638]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d2:65:38 brd ff:ff:ff:ff:ff:ff Sep 13 00:54:21.663543 waagent[1638]: 3: enP46067s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d2:65:38 brd ff:ff:ff:ff:ff:ff\ altname enP46067p0s2 Sep 13 00:54:21.663543 waagent[1638]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 00:54:21.663543 waagent[1638]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 00:54:21.663543 waagent[1638]: 2: eth0 inet 10.200.4.18/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 00:54:21.663543 waagent[1638]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 00:54:21.663543 waagent[1638]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 00:54:21.663543 waagent[1638]: 2: eth0 inet6 fe80::6245:bdff:fed2:6538/64 scope link \ valid_lft forever preferred_lft forever Sep 13 00:54:21.670053 waagent[1638]: 2025-09-13T00:54:21.669986Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 00:54:21.684601 waagent[1638]: 2025-09-13T00:54:21.684551Z INFO ExtHandler ExtHandler Sep 13 00:54:21.684912 waagent[1638]: 2025-09-13T00:54:21.684864Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: e7807cea-e06b-4852-bde0-c9a0d715e4a2 correlation f1f9e442-ba27-4a3d-a001-7dbcd16c9d7e created: 2025-09-13T00:52:32.694565Z] Sep 13 00:54:21.687652 waagent[1638]: 2025-09-13T00:54:21.687602Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 00:54:21.690518 waagent[1638]: 2025-09-13T00:54:21.690464Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 5 ms] Sep 13 00:54:21.697600 waagent[1638]: 2025-09-13T00:54:21.697541Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 00:54:21.717721 waagent[1638]: 2025-09-13T00:54:21.717664Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 00:54:21.725286 waagent[1638]: 2025-09-13T00:54:21.725233Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 00:54:21.728668 waagent[1638]: 2025-09-13T00:54:21.728616Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: AE82123F-3374-4FB9-948A-BD5646216CCC;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 00:54:25.630475 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 00:54:25.630708 systemd[1]: Stopped kubelet.service. Sep 13 00:54:25.632148 systemd[1]: Starting kubelet.service... Sep 13 00:54:25.826914 systemd[1]: Started kubelet.service. Sep 13 00:54:26.374837 kubelet[1683]: E0913 00:54:26.374790 1683 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:26.376458 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:26.376616 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:36.380236 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 00:54:36.380468 systemd[1]: Stopped kubelet.service. Sep 13 00:54:36.381959 systemd[1]: Starting kubelet.service... Sep 13 00:54:36.723157 systemd[1]: Started kubelet.service. Sep 13 00:54:37.115662 kubelet[1692]: E0913 00:54:37.115563 1692 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:37.117137 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:37.117310 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:38.012491 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Sep 13 00:54:47.130286 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 13 00:54:47.130532 systemd[1]: Stopped kubelet.service. Sep 13 00:54:47.131985 systemd[1]: Starting kubelet.service... Sep 13 00:54:47.472781 systemd[1]: Started kubelet.service. Sep 13 00:54:47.873602 kubelet[1701]: E0913 00:54:47.873499 1701 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:47.875127 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:47.875295 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:49.104595 update_engine[1427]: I0913 00:54:49.104529 1427 update_attempter.cc:509] Updating boot flags... Sep 13 00:54:50.017405 systemd[1]: Created slice system-sshd.slice. Sep 13 00:54:50.018983 systemd[1]: Started sshd@0-10.200.4.18:22-10.200.16.10:60914.service. Sep 13 00:54:50.870275 sshd[1774]: Accepted publickey for core from 10.200.16.10 port 60914 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:50.871574 sshd[1774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:50.876022 systemd[1]: Started session-3.scope. Sep 13 00:54:50.876573 systemd-logind[1426]: New session 3 of user core. Sep 13 00:54:51.389627 systemd[1]: Started sshd@1-10.200.4.18:22-10.200.16.10:60918.service. Sep 13 00:54:51.973246 sshd[1779]: Accepted publickey for core from 10.200.16.10 port 60918 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:51.974499 sshd[1779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:51.978870 systemd[1]: Started session-4.scope. Sep 13 00:54:51.979433 systemd-logind[1426]: New session 4 of user core. Sep 13 00:54:52.395514 sshd[1779]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:52.397935 systemd[1]: sshd@1-10.200.4.18:22-10.200.16.10:60918.service: Deactivated successfully. Sep 13 00:54:52.398711 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:54:52.399298 systemd-logind[1426]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:54:52.399978 systemd-logind[1426]: Removed session 4. Sep 13 00:54:52.493084 systemd[1]: Started sshd@2-10.200.4.18:22-10.200.16.10:60932.service. Sep 13 00:54:53.075643 sshd[1785]: Accepted publickey for core from 10.200.16.10 port 60932 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:53.076874 sshd[1785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:53.081224 systemd[1]: Started session-5.scope. Sep 13 00:54:53.081760 systemd-logind[1426]: New session 5 of user core. Sep 13 00:54:53.496377 sshd[1785]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:53.498816 systemd[1]: sshd@2-10.200.4.18:22-10.200.16.10:60932.service: Deactivated successfully. Sep 13 00:54:53.499573 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:54:53.500163 systemd-logind[1426]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:54:53.500867 systemd-logind[1426]: Removed session 5. Sep 13 00:54:53.593869 systemd[1]: Started sshd@3-10.200.4.18:22-10.200.16.10:60946.service. Sep 13 00:54:54.172416 sshd[1791]: Accepted publickey for core from 10.200.16.10 port 60946 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:54.173625 sshd[1791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:54.178001 systemd[1]: Started session-6.scope. Sep 13 00:54:54.178564 systemd-logind[1426]: New session 6 of user core. Sep 13 00:54:54.587426 sshd[1791]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:54.590090 systemd[1]: sshd@3-10.200.4.18:22-10.200.16.10:60946.service: Deactivated successfully. Sep 13 00:54:54.590864 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:54:54.591474 systemd-logind[1426]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:54:54.592148 systemd-logind[1426]: Removed session 6. Sep 13 00:54:54.683977 systemd[1]: Started sshd@4-10.200.4.18:22-10.200.16.10:60956.service. Sep 13 00:54:55.262278 sshd[1797]: Accepted publickey for core from 10.200.16.10 port 60956 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:55.263489 sshd[1797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:55.267884 systemd[1]: Started session-7.scope. Sep 13 00:54:55.268433 systemd-logind[1426]: New session 7 of user core. Sep 13 00:54:55.953530 sudo[1800]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:54:55.953819 sudo[1800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:54:55.975405 dbus-daemon[1416]: \xd0\xedSA-V: received setenforce notice (enforcing=652840880) Sep 13 00:54:55.977051 sudo[1800]: pam_unix(sudo:session): session closed for user root Sep 13 00:54:56.090806 sshd[1797]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:56.093640 systemd[1]: sshd@4-10.200.4.18:22-10.200.16.10:60956.service: Deactivated successfully. Sep 13 00:54:56.094459 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:54:56.095057 systemd-logind[1426]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:54:56.095832 systemd-logind[1426]: Removed session 7. Sep 13 00:54:56.188044 systemd[1]: Started sshd@5-10.200.4.18:22-10.200.16.10:60966.service. Sep 13 00:54:56.766245 sshd[1804]: Accepted publickey for core from 10.200.16.10 port 60966 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:56.767529 sshd[1804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:56.771934 systemd[1]: Started session-8.scope. Sep 13 00:54:56.772475 systemd-logind[1426]: New session 8 of user core. Sep 13 00:54:57.088462 sudo[1808]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:54:57.088955 sudo[1808]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:54:57.091488 sudo[1808]: pam_unix(sudo:session): session closed for user root Sep 13 00:54:57.095705 sudo[1807]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:54:57.095983 sudo[1807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:54:57.103930 systemd[1]: Stopping audit-rules.service... Sep 13 00:54:57.108462 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 00:54:57.108532 kernel: audit: type=1305 audit(1757724897.103:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:54:57.103000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:54:57.108791 auditctl[1811]: No rules Sep 13 00:54:57.109402 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:54:57.109569 systemd[1]: Stopped audit-rules.service. Sep 13 00:54:57.111159 systemd[1]: Starting audit-rules.service... Sep 13 00:54:57.103000 audit[1811]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc12897a0 a2=420 a3=0 items=0 ppid=1 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:57.131970 kernel: audit: type=1300 audit(1757724897.103:199): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc12897a0 a2=420 a3=0 items=0 ppid=1 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:57.103000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:54:57.135414 augenrules[1828]: No rules Sep 13 00:54:57.136175 systemd[1]: Finished audit-rules.service. Sep 13 00:54:57.136976 kernel: audit: type=1327 audit(1757724897.103:199): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:54:57.139229 kernel: audit: type=1131 audit(1757724897.108:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.137484 sudo[1807]: pam_unix(sudo:session): session closed for user root Sep 13 00:54:57.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.148219 kernel: audit: type=1130 audit(1757724897.135:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.136000 audit[1807]: USER_END pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.169599 kernel: audit: type=1106 audit(1757724897.136:202): pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.169644 kernel: audit: type=1104 audit(1757724897.136:203): pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.136000 audit[1807]: CRED_DISP pid=1807 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.239554 sshd[1804]: pam_unix(sshd:session): session closed for user core Sep 13 00:54:57.239000 audit[1804]: USER_END pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:57.242601 systemd[1]: sshd@5-10.200.4.18:22-10.200.16.10:60966.service: Deactivated successfully. Sep 13 00:54:57.243350 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:54:57.244463 systemd-logind[1426]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:54:57.245343 systemd-logind[1426]: Removed session 8. Sep 13 00:54:57.239000 audit[1804]: CRED_DISP pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:57.268980 kernel: audit: type=1106 audit(1757724897.239:204): pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:57.269043 kernel: audit: type=1104 audit(1757724897.239:205): pid=1804 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:57.269078 kernel: audit: type=1131 audit(1757724897.239:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.18:22-10.200.16.10:60966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.18:22-10.200.16.10:60966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.336027 systemd[1]: Started sshd@6-10.200.4.18:22-10.200.16.10:60974.service. Sep 13 00:54:57.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.18:22-10.200.16.10:60974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.880252 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Sep 13 00:54:57.880469 systemd[1]: Stopped kubelet.service. Sep 13 00:54:57.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:57.882008 systemd[1]: Starting kubelet.service... Sep 13 00:54:57.911000 audit[1834]: USER_ACCT pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:57.912966 sshd[1834]: Accepted publickey for core from 10.200.16.10 port 60974 ssh2: RSA SHA256:zK3kxTPXsdaCY/XytugRgS+7VrhsOEAnV/FpwU6+RkI Sep 13 00:54:57.912000 audit[1834]: CRED_ACQ pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:57.913000 audit[1834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf85c3b0 a2=3 a3=0 items=0 ppid=1 pid=1834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:54:57.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:54:57.914682 sshd[1834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:54:57.920456 systemd[1]: Started session-9.scope. Sep 13 00:54:57.921017 systemd-logind[1426]: New session 9 of user core. Sep 13 00:54:57.925000 audit[1834]: USER_START pid=1834 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:57.927000 audit[1838]: CRED_ACQ pid=1838 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:54:58.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:58.135898 systemd[1]: Started kubelet.service. Sep 13 00:54:58.233000 audit[1846]: USER_ACCT pid=1846 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:54:58.234809 sudo[1846]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:54:58.233000 audit[1846]: CRED_REFR pid=1846 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:54:58.235099 sudo[1846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:54:58.235000 audit[1846]: USER_START pid=1846 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:54:58.605962 systemd[1]: Starting coreos-metadata.service... Sep 13 00:54:58.627492 kubelet[1841]: E0913 00:54:58.627454 1841 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:54:58.628846 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:54:58.628996 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:54:58.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:54:58.742368 coreos-metadata[1850]: Sep 13 00:54:58.742 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 00:54:58.745390 coreos-metadata[1850]: Sep 13 00:54:58.745 INFO Fetch successful Sep 13 00:54:58.745669 coreos-metadata[1850]: Sep 13 00:54:58.745 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 13 00:54:58.747144 coreos-metadata[1850]: Sep 13 00:54:58.747 INFO Fetch successful Sep 13 00:54:58.747544 coreos-metadata[1850]: Sep 13 00:54:58.747 INFO Fetching http://168.63.129.16/machine/d28c51a5-e839-477d-aa63-a37421793aab/76563a60%2D5046%2D415e%2D811c%2D3e69413571d8.%5Fci%2D3510.3.8%2Dn%2D99b5c97c7e?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 13 00:54:58.748825 coreos-metadata[1850]: Sep 13 00:54:58.748 INFO Fetch successful Sep 13 00:54:58.779048 coreos-metadata[1850]: Sep 13 00:54:58.778 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 13 00:54:58.790810 coreos-metadata[1850]: Sep 13 00:54:58.790 INFO Fetch successful Sep 13 00:54:58.798455 systemd[1]: Finished coreos-metadata.service. Sep 13 00:54:58.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:59.303578 systemd[1]: Stopped kubelet.service. Sep 13 00:54:59.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:59.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:59.306504 systemd[1]: Starting kubelet.service... Sep 13 00:54:59.334518 systemd[1]: Reloading. Sep 13 00:54:59.422596 /usr/lib/systemd/system-generators/torcx-generator[1906]: time="2025-09-13T00:54:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:54:59.430300 /usr/lib/systemd/system-generators/torcx-generator[1906]: time="2025-09-13T00:54:59Z" level=info msg="torcx already run" Sep 13 00:54:59.516468 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:54:59.516487 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:54:59.531027 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit: BPF prog-id=41 op=LOAD Sep 13 00:54:59.598000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit: BPF prog-id=42 op=LOAD Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.598000 audit: BPF prog-id=43 op=LOAD Sep 13 00:54:59.598000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:54:59.598000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.599000 audit: BPF prog-id=44 op=LOAD Sep 13 00:54:59.600000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit: BPF prog-id=45 op=LOAD Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit: BPF prog-id=46 op=LOAD Sep 13 00:54:59.600000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:54:59.600000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.601000 audit: BPF prog-id=47 op=LOAD Sep 13 00:54:59.601000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.602000 audit: BPF prog-id=48 op=LOAD Sep 13 00:54:59.602000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit: BPF prog-id=49 op=LOAD Sep 13 00:54:59.604000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit: BPF prog-id=50 op=LOAD Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.604000 audit: BPF prog-id=51 op=LOAD Sep 13 00:54:59.604000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:54:59.604000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit: BPF prog-id=52 op=LOAD Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.606000 audit: BPF prog-id=53 op=LOAD Sep 13 00:54:59.606000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:54:59.606000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.607000 audit: BPF prog-id=54 op=LOAD Sep 13 00:54:59.607000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:54:59.609000 audit: BPF prog-id=55 op=LOAD Sep 13 00:54:59.609000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:54:59.636785 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Sep 13 00:54:59.636872 systemd[1]: kubelet.service: Failed with result 'signal'. Sep 13 00:54:59.637132 systemd[1]: Stopped kubelet.service. Sep 13 00:54:59.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:54:59.638914 systemd[1]: Starting kubelet.service... Sep 13 00:54:59.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:54:59.895071 systemd[1]: Started kubelet.service. Sep 13 00:55:00.647948 kubelet[1974]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:55:00.648359 kubelet[1974]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:55:00.648492 kubelet[1974]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:55:00.648710 kubelet[1974]: I0913 00:55:00.648681 1974 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:55:00.901363 kubelet[1974]: I0913 00:55:00.901068 1974 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 13 00:55:00.901363 kubelet[1974]: I0913 00:55:00.901092 1974 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:55:00.901556 kubelet[1974]: I0913 00:55:00.901493 1974 server.go:956] "Client rotation is on, will bootstrap in background" Sep 13 00:55:00.932442 kubelet[1974]: I0913 00:55:00.932414 1974 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:55:00.945923 kubelet[1974]: E0913 00:55:00.945878 1974 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:55:00.945923 kubelet[1974]: I0913 00:55:00.945921 1974 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:55:00.951262 kubelet[1974]: I0913 00:55:00.951236 1974 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:55:00.951851 kubelet[1974]: I0913 00:55:00.951459 1974 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:55:00.951851 kubelet[1974]: I0913 00:55:00.951489 1974 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.4.18","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:55:00.951851 kubelet[1974]: I0913 00:55:00.951715 1974 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:55:00.951851 kubelet[1974]: I0913 00:55:00.951727 1974 container_manager_linux.go:303] "Creating device plugin manager" Sep 13 00:55:00.951851 kubelet[1974]: I0913 00:55:00.951839 1974 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:55:00.966575 kubelet[1974]: I0913 00:55:00.966551 1974 kubelet.go:480] "Attempting to sync node with API server" Sep 13 00:55:00.966575 kubelet[1974]: I0913 00:55:00.966578 1974 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:55:00.974121 kubelet[1974]: I0913 00:55:00.973854 1974 kubelet.go:386] "Adding apiserver pod source" Sep 13 00:55:00.974121 kubelet[1974]: I0913 00:55:00.973883 1974 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:55:00.978164 kubelet[1974]: E0913 00:55:00.978146 1974 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:00.978307 kubelet[1974]: E0913 00:55:00.978294 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:00.983926 kubelet[1974]: I0913 00:55:00.983889 1974 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:55:00.984803 kubelet[1974]: I0913 00:55:00.984498 1974 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 13 00:55:00.990566 kubelet[1974]: W0913 00:55:00.990541 1974 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:55:00.992838 kubelet[1974]: I0913 00:55:00.992823 1974 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:55:00.992903 kubelet[1974]: I0913 00:55:00.992875 1974 server.go:1289] "Started kubelet" Sep 13 00:55:00.993240 kubelet[1974]: I0913 00:55:00.993174 1974 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:55:00.994145 kubelet[1974]: I0913 00:55:00.994125 1974 server.go:317] "Adding debug handlers to kubelet server" Sep 13 00:55:00.993000 audit[1974]: AVC avc: denied { mac_admin } for pid=1974 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:00.993000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:55:00.993000 audit[1974]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000392ae0 a1=c000654390 a2=c000392ab0 a3=25 items=0 ppid=1 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:00.993000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:55:00.994779 kubelet[1974]: I0913 00:55:00.994749 1974 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:55:00.993000 audit[1974]: AVC avc: denied { mac_admin } for pid=1974 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:00.993000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:55:00.993000 audit[1974]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000422b20 a1=c0006543a8 a2=c000392b70 a3=25 items=0 ppid=1 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:00.993000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:55:00.995121 kubelet[1974]: I0913 00:55:00.995105 1974 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:55:00.995263 kubelet[1974]: I0913 00:55:00.995252 1974 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:55:00.997664 kubelet[1974]: I0913 00:55:00.997614 1974 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:55:00.997837 kubelet[1974]: I0913 00:55:00.997820 1974 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:55:01.000000 audit[1990]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.000000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe2056690 a2=0 a3=7fffe205667c items=0 ppid=1974 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:55:01.001000 audit[1991]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.001000 audit[1991]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe11049370 a2=0 a3=7ffe1104935c items=0 ppid=1974 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:55:01.003813 kubelet[1974]: I0913 00:55:01.003792 1974 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:55:01.004143 kubelet[1974]: I0913 00:55:01.004121 1974 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:55:01.004334 kubelet[1974]: E0913 00:55:01.004314 1974 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.18\" not found" Sep 13 00:55:01.004000 audit[1993]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.004000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe876b2d60 a2=0 a3=7ffe876b2d4c items=0 ppid=1974 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:55:01.007775 kubelet[1974]: I0913 00:55:01.007068 1974 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:55:01.007775 kubelet[1974]: I0913 00:55:01.007121 1974 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:55:01.008217 kubelet[1974]: I0913 00:55:01.008166 1974 factory.go:223] Registration of the systemd container factory successfully Sep 13 00:55:01.008303 kubelet[1974]: I0913 00:55:01.008278 1974 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:55:01.010221 kubelet[1974]: I0913 00:55:01.010193 1974 factory.go:223] Registration of the containerd container factory successfully Sep 13 00:55:01.010000 audit[1995]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.010000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd0a8b0260 a2=0 a3=7ffd0a8b024c items=0 ppid=1974 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:55:01.019929 kubelet[1974]: E0913 00:55:01.019911 1974 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:55:01.020315 kubelet[1974]: E0913 00:55:01.020298 1974 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.4.18\" not found" node="10.200.4.18" Sep 13 00:55:01.023923 kubelet[1974]: I0913 00:55:01.023905 1974 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:55:01.023923 kubelet[1974]: I0913 00:55:01.023920 1974 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:55:01.024021 kubelet[1974]: I0913 00:55:01.023935 1974 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:55:01.028490 kubelet[1974]: I0913 00:55:01.028480 1974 policy_none.go:49] "None policy: Start" Sep 13 00:55:01.028567 kubelet[1974]: I0913 00:55:01.028560 1974 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:55:01.028607 kubelet[1974]: I0913 00:55:01.028603 1974 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:55:01.037528 systemd[1]: Created slice kubepods.slice. Sep 13 00:55:01.043314 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:55:01.046679 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:55:01.052332 kubelet[1974]: E0913 00:55:01.051883 1974 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 13 00:55:01.051000 audit[1974]: AVC avc: denied { mac_admin } for pid=1974 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:01.051000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:55:01.051000 audit[1974]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e89b60 a1=c0006b2240 a2=c000e89b30 a3=25 items=0 ppid=1 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.051000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:55:01.054537 kubelet[1974]: E0913 00:55:01.053125 1974 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 13 00:55:01.054537 kubelet[1974]: I0913 00:55:01.053269 1974 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:55:01.054537 kubelet[1974]: I0913 00:55:01.053282 1974 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:55:01.054537 kubelet[1974]: I0913 00:55:01.053789 1974 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:55:01.057232 kubelet[1974]: E0913 00:55:01.057168 1974 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:55:01.057305 kubelet[1974]: E0913 00:55:01.057254 1974 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.4.18\" not found" Sep 13 00:55:01.056000 audit[2003]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.056000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe9b4e20f0 a2=0 a3=7ffe9b4e20dc items=0 ppid=1974 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:55:01.058467 kubelet[1974]: I0913 00:55:01.058441 1974 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 13 00:55:01.058000 audit[2004]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=2004 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:01.058000 audit[2004]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5501cdd0 a2=0 a3=7fff5501cdbc items=0 ppid=1974 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:55:01.058000 audit[2005]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.058000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcef3d3030 a2=0 a3=7ffcef3d301c items=0 ppid=1974 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:55:01.060162 kubelet[1974]: I0913 00:55:01.060143 1974 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 13 00:55:01.060238 kubelet[1974]: I0913 00:55:01.060167 1974 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 13 00:55:01.060238 kubelet[1974]: I0913 00:55:01.060195 1974 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:55:01.060313 kubelet[1974]: I0913 00:55:01.060269 1974 kubelet.go:2436] "Starting kubelet main sync loop" Sep 13 00:55:01.060389 kubelet[1974]: E0913 00:55:01.060373 1974 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 00:55:01.060000 audit[2006]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.060000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc07332d20 a2=0 a3=7ffc07332d0c items=0 ppid=1974 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:55:01.062000 audit[2008]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:01.062000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff78053f00 a2=0 a3=7fff78053eec items=0 ppid=1974 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:55:01.062000 audit[2007]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:01.062000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6242f740 a2=0 a3=7ffc6242f72c items=0 ppid=1974 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:55:01.063000 audit[2009]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=2009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:01.063000 audit[2009]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff09d3ca00 a2=0 a3=7fff09d3c9ec items=0 ppid=1974 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:55:01.064000 audit[2010]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2010 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:01.064000 audit[2010]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd26c28ed0 a2=0 a3=7ffd26c28ebc items=0 ppid=1974 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:01.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:55:01.154987 kubelet[1974]: I0913 00:55:01.154887 1974 kubelet_node_status.go:75] "Attempting to register node" node="10.200.4.18" Sep 13 00:55:01.164456 kubelet[1974]: I0913 00:55:01.164435 1974 kubelet_node_status.go:78] "Successfully registered node" node="10.200.4.18" Sep 13 00:55:01.277793 kubelet[1974]: I0913 00:55:01.277766 1974 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 00:55:01.278151 env[1438]: time="2025-09-13T00:55:01.278117781Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:55:01.278537 kubelet[1974]: I0913 00:55:01.278306 1974 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 00:55:01.430568 sudo[1846]: pam_unix(sudo:session): session closed for user root Sep 13 00:55:01.429000 audit[1846]: USER_END pid=1846 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.429000 audit[1846]: CRED_DISP pid=1846 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.532558 sshd[1834]: pam_unix(sshd:session): session closed for user core Sep 13 00:55:01.532000 audit[1834]: USER_END pid=1834 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:01.532000 audit[1834]: CRED_DISP pid=1834 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 00:55:01.535277 systemd[1]: sshd@6-10.200.4.18:22-10.200.16.10:60974.service: Deactivated successfully. Sep 13 00:55:01.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.18:22-10.200.16.10:60974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:55:01.536072 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:55:01.536720 systemd-logind[1426]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:55:01.537586 systemd-logind[1426]: Removed session 9. Sep 13 00:55:01.903609 kubelet[1974]: I0913 00:55:01.903582 1974 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 00:55:01.904081 kubelet[1974]: I0913 00:55:01.903748 1974 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 13 00:55:01.904081 kubelet[1974]: I0913 00:55:01.903784 1974 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 13 00:55:01.904081 kubelet[1974]: I0913 00:55:01.903819 1974 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 13 00:55:01.979108 kubelet[1974]: E0913 00:55:01.978865 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:01.979108 kubelet[1974]: I0913 00:55:01.978873 1974 apiserver.go:52] "Watching apiserver" Sep 13 00:55:01.986117 kubelet[1974]: E0913 00:55:01.986081 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:01.997801 systemd[1]: Created slice kubepods-besteffort-podd3c8ed5c_1ec0_4238_bacf_9552a058c1d5.slice. Sep 13 00:55:02.007487 kubelet[1974]: I0913 00:55:02.007466 1974 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:55:02.007662 systemd[1]: Created slice kubepods-besteffort-pode3479064_584f_4edd_9554_710f5bd8cb4d.slice. Sep 13 00:55:02.016107 kubelet[1974]: I0913 00:55:02.016074 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/da606d41-78bf-44c8-a819-bc90e65bd4e7-socket-dir\") pod \"csi-node-driver-xppb6\" (UID: \"da606d41-78bf-44c8-a819-bc90e65bd4e7\") " pod="calico-system/csi-node-driver-xppb6" Sep 13 00:55:02.016240 kubelet[1974]: I0913 00:55:02.016120 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/da606d41-78bf-44c8-a819-bc90e65bd4e7-varrun\") pod \"csi-node-driver-xppb6\" (UID: \"da606d41-78bf-44c8-a819-bc90e65bd4e7\") " pod="calico-system/csi-node-driver-xppb6" Sep 13 00:55:02.016240 kubelet[1974]: I0913 00:55:02.016159 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d3c8ed5c-1ec0-4238-bacf-9552a058c1d5-kube-proxy\") pod \"kube-proxy-2859r\" (UID: \"d3c8ed5c-1ec0-4238-bacf-9552a058c1d5\") " pod="kube-system/kube-proxy-2859r" Sep 13 00:55:02.016240 kubelet[1974]: I0913 00:55:02.016185 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d3c8ed5c-1ec0-4238-bacf-9552a058c1d5-xtables-lock\") pod \"kube-proxy-2859r\" (UID: \"d3c8ed5c-1ec0-4238-bacf-9552a058c1d5\") " pod="kube-system/kube-proxy-2859r" Sep 13 00:55:02.016486 kubelet[1974]: I0913 00:55:02.016446 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vbl9g\" (UniqueName: \"kubernetes.io/projected/d3c8ed5c-1ec0-4238-bacf-9552a058c1d5-kube-api-access-vbl9g\") pod \"kube-proxy-2859r\" (UID: \"d3c8ed5c-1ec0-4238-bacf-9552a058c1d5\") " pod="kube-system/kube-proxy-2859r" Sep 13 00:55:02.016550 kubelet[1974]: I0913 00:55:02.016495 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-cni-bin-dir\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016550 kubelet[1974]: I0913 00:55:02.016517 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-cni-log-dir\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016550 kubelet[1974]: I0913 00:55:02.016537 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-cni-net-dir\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016668 kubelet[1974]: I0913 00:55:02.016560 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/da606d41-78bf-44c8-a819-bc90e65bd4e7-kubelet-dir\") pod \"csi-node-driver-xppb6\" (UID: \"da606d41-78bf-44c8-a819-bc90e65bd4e7\") " pod="calico-system/csi-node-driver-xppb6" Sep 13 00:55:02.016668 kubelet[1974]: I0913 00:55:02.016584 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sb468\" (UniqueName: \"kubernetes.io/projected/da606d41-78bf-44c8-a819-bc90e65bd4e7-kube-api-access-sb468\") pod \"csi-node-driver-xppb6\" (UID: \"da606d41-78bf-44c8-a819-bc90e65bd4e7\") " pod="calico-system/csi-node-driver-xppb6" Sep 13 00:55:02.016668 kubelet[1974]: I0913 00:55:02.016607 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d3c8ed5c-1ec0-4238-bacf-9552a058c1d5-lib-modules\") pod \"kube-proxy-2859r\" (UID: \"d3c8ed5c-1ec0-4238-bacf-9552a058c1d5\") " pod="kube-system/kube-proxy-2859r" Sep 13 00:55:02.016668 kubelet[1974]: I0913 00:55:02.016630 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-flexvol-driver-host\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016668 kubelet[1974]: I0913 00:55:02.016655 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e3479064-584f-4edd-9554-710f5bd8cb4d-node-certs\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016850 kubelet[1974]: I0913 00:55:02.016677 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-policysync\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016850 kubelet[1974]: I0913 00:55:02.016699 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-var-lib-calico\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016850 kubelet[1974]: I0913 00:55:02.016720 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-var-run-calico\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016850 kubelet[1974]: I0913 00:55:02.016741 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tc8r9\" (UniqueName: \"kubernetes.io/projected/e3479064-584f-4edd-9554-710f5bd8cb4d-kube-api-access-tc8r9\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.016850 kubelet[1974]: I0913 00:55:02.016772 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/da606d41-78bf-44c8-a819-bc90e65bd4e7-registration-dir\") pod \"csi-node-driver-xppb6\" (UID: \"da606d41-78bf-44c8-a819-bc90e65bd4e7\") " pod="calico-system/csi-node-driver-xppb6" Sep 13 00:55:02.017018 kubelet[1974]: I0913 00:55:02.016793 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-lib-modules\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.017018 kubelet[1974]: I0913 00:55:02.016815 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e3479064-584f-4edd-9554-710f5bd8cb4d-tigera-ca-bundle\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.017018 kubelet[1974]: I0913 00:55:02.016837 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e3479064-584f-4edd-9554-710f5bd8cb4d-xtables-lock\") pod \"calico-node-zlfjd\" (UID: \"e3479064-584f-4edd-9554-710f5bd8cb4d\") " pod="calico-system/calico-node-zlfjd" Sep 13 00:55:02.119364 kubelet[1974]: I0913 00:55:02.119333 1974 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:55:02.125582 kubelet[1974]: E0913 00:55:02.125561 1974 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:55:02.125726 kubelet[1974]: W0913 00:55:02.125714 1974 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:55:02.125803 kubelet[1974]: E0913 00:55:02.125790 1974 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:55:02.135331 kubelet[1974]: E0913 00:55:02.135127 1974 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:55:02.135331 kubelet[1974]: W0913 00:55:02.135145 1974 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:55:02.135331 kubelet[1974]: E0913 00:55:02.135165 1974 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:55:02.141147 kubelet[1974]: E0913 00:55:02.141127 1974 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:55:02.141299 kubelet[1974]: W0913 00:55:02.141286 1974 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:55:02.141374 kubelet[1974]: E0913 00:55:02.141363 1974 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:55:02.147083 kubelet[1974]: E0913 00:55:02.147060 1974 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:55:02.147083 kubelet[1974]: W0913 00:55:02.147076 1974 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:55:02.147242 kubelet[1974]: E0913 00:55:02.147093 1974 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:55:02.304409 env[1438]: time="2025-09-13T00:55:02.304291630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2859r,Uid:d3c8ed5c-1ec0-4238-bacf-9552a058c1d5,Namespace:kube-system,Attempt:0,}" Sep 13 00:55:02.312858 env[1438]: time="2025-09-13T00:55:02.312796544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zlfjd,Uid:e3479064-584f-4edd-9554-710f5bd8cb4d,Namespace:calico-system,Attempt:0,}" Sep 13 00:55:02.979698 kubelet[1974]: E0913 00:55:02.979654 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:03.980099 kubelet[1974]: E0913 00:55:03.980057 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:04.061014 kubelet[1974]: E0913 00:55:04.060976 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:04.980567 kubelet[1974]: E0913 00:55:04.980526 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:05.981629 kubelet[1974]: E0913 00:55:05.981595 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:06.060695 kubelet[1974]: E0913 00:55:06.060658 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:06.345258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2959767253.mount: Deactivated successfully. Sep 13 00:55:06.371529 env[1438]: time="2025-09-13T00:55:06.371484088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.376914 env[1438]: time="2025-09-13T00:55:06.376868796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.379377 env[1438]: time="2025-09-13T00:55:06.379347800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.384072 env[1438]: time="2025-09-13T00:55:06.384044407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.386797 env[1438]: time="2025-09-13T00:55:06.386768411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.389079 env[1438]: time="2025-09-13T00:55:06.389054114Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.397455 env[1438]: time="2025-09-13T00:55:06.397417927Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.397927 env[1438]: time="2025-09-13T00:55:06.397897527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:06.455857 env[1438]: time="2025-09-13T00:55:06.455796614Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:06.455857 env[1438]: time="2025-09-13T00:55:06.455834714Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:06.456023 env[1438]: time="2025-09-13T00:55:06.455988714Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:06.456232 env[1438]: time="2025-09-13T00:55:06.456181114Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40 pid=2028 runtime=io.containerd.runc.v2 Sep 13 00:55:06.458348 env[1438]: time="2025-09-13T00:55:06.458281118Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:06.458511 env[1438]: time="2025-09-13T00:55:06.458485618Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:06.458624 env[1438]: time="2025-09-13T00:55:06.458603818Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:06.458866 env[1438]: time="2025-09-13T00:55:06.458825918Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4cd6d6fb00c845e63146b728193f5e456efb01bc10f577a8a63b2a42f81145f0 pid=2043 runtime=io.containerd.runc.v2 Sep 13 00:55:06.483510 systemd[1]: Started cri-containerd-da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40.scope. Sep 13 00:55:06.495227 systemd[1]: Started cri-containerd-4cd6d6fb00c845e63146b728193f5e456efb01bc10f577a8a63b2a42f81145f0.scope. Sep 13 00:55:06.517987 kernel: kauditd_printk_skb: 245 callbacks suppressed Sep 13 00:55:06.518126 kernel: audit: type=1400 audit(1757724906.503:417): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.542722 kernel: audit: type=1400 audit(1757724906.503:418): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.542806 kernel: audit: type=1400 audit(1757724906.503:419): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.543050 env[1438]: time="2025-09-13T00:55:06.543010144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zlfjd,Uid:e3479064-584f-4edd-9554-710f5bd8cb4d,Namespace:calico-system,Attempt:0,} returns sandbox id \"da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40\"" Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.547443 env[1438]: time="2025-09-13T00:55:06.545616748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:55:06.554999 kernel: audit: type=1400 audit(1757724906.503:420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.569213 kernel: audit: type=1400 audit(1757724906.503:421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.569279 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:55:06.587569 kernel: audit: type=1400 audit(1757724906.503:422): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.587631 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.611223 kernel: audit: type=1400 audit(1757724906.503:423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.611329 kernel: audit: backlog limit exceeded Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.506000 audit: BPF prog-id=56 op=LOAD Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2028 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396335363532363931393839366365663964633965623830336237 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2028 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396335363532363931393839366365663964633965623830336237 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.507000 audit: BPF prog-id=57 op=LOAD Sep 13 00:55:06.507000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c9eb0 items=0 ppid=2028 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396335363532363931393839366365663964633965623830336237 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.516000 audit: BPF prog-id=58 op=LOAD Sep 13 00:55:06.516000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c9ef8 items=0 ppid=2028 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396335363532363931393839366365663964633965623830336237 Sep 13 00:55:06.516000 audit: BPF prog-id=58 op=UNLOAD Sep 13 00:55:06.516000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.517000 audit: BPF prog-id=59 op=LOAD Sep 13 00:55:06.517000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000392308 items=0 ppid=2028 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396335363532363931393839366365663964633965623830336237 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.610000 audit: BPF prog-id=60 op=LOAD Sep 13 00:55:06.610000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.610000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2043 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463643664366662303063383435653633313436623732383139336635 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2043 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463643664366662303063383435653633313436623732383139336635 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.612000 audit: BPF prog-id=61 op=LOAD Sep 13 00:55:06.612000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002cdf00 items=0 ppid=2043 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463643664366662303063383435653633313436623732383139336635 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit: BPF prog-id=62 op=LOAD Sep 13 00:55:06.613000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002cdf48 items=0 ppid=2043 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463643664366662303063383435653633313436623732383139336635 Sep 13 00:55:06.613000 audit: BPF prog-id=62 op=UNLOAD Sep 13 00:55:06.613000 audit: BPF prog-id=61 op=UNLOAD Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:06.613000 audit: BPF prog-id=63 op=LOAD Sep 13 00:55:06.613000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000338358 items=0 ppid=2043 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:06.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463643664366662303063383435653633313436623732383139336635 Sep 13 00:55:06.625780 env[1438]: time="2025-09-13T00:55:06.625739268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2859r,Uid:d3c8ed5c-1ec0-4238-bacf-9552a058c1d5,Namespace:kube-system,Attempt:0,} returns sandbox id \"4cd6d6fb00c845e63146b728193f5e456efb01bc10f577a8a63b2a42f81145f0\"" Sep 13 00:55:06.982400 kubelet[1974]: E0913 00:55:06.982366 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:07.929108 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3664377415.mount: Deactivated successfully. Sep 13 00:55:07.983026 kubelet[1974]: E0913 00:55:07.982984 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:08.061091 kubelet[1974]: E0913 00:55:08.061041 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:08.151922 env[1438]: time="2025-09-13T00:55:08.151871595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:08.156452 env[1438]: time="2025-09-13T00:55:08.156415202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:08.159436 env[1438]: time="2025-09-13T00:55:08.159405506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:08.163814 env[1438]: time="2025-09-13T00:55:08.163782312Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:08.164259 env[1438]: time="2025-09-13T00:55:08.164232013Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:55:08.166091 env[1438]: time="2025-09-13T00:55:08.166068815Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Sep 13 00:55:08.170517 env[1438]: time="2025-09-13T00:55:08.170486321Z" level=info msg="CreateContainer within sandbox \"da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:55:08.195196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3988647754.mount: Deactivated successfully. Sep 13 00:55:08.208194 env[1438]: time="2025-09-13T00:55:08.208161375Z" level=info msg="CreateContainer within sandbox \"da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ce2a7baaf122581652b79d25b630aceef41f1ea9e8c7c75481040d447b044af2\"" Sep 13 00:55:08.209039 env[1438]: time="2025-09-13T00:55:08.209012376Z" level=info msg="StartContainer for \"ce2a7baaf122581652b79d25b630aceef41f1ea9e8c7c75481040d447b044af2\"" Sep 13 00:55:08.225325 systemd[1]: Started cri-containerd-ce2a7baaf122581652b79d25b630aceef41f1ea9e8c7c75481040d447b044af2.scope. Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f011010a7a8 items=0 ppid=2028 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326137626161663132323538313635326237396432356236333061 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit: BPF prog-id=64 op=LOAD Sep 13 00:55:08.241000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00020e8e8 items=0 ppid=2028 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326137626161663132323538313635326237396432356236333061 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit: BPF prog-id=65 op=LOAD Sep 13 00:55:08.241000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00020e938 items=0 ppid=2028 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326137626161663132323538313635326237396432356236333061 Sep 13 00:55:08.241000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:55:08.241000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:08.241000 audit: BPF prog-id=66 op=LOAD Sep 13 00:55:08.241000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00020e9c8 items=0 ppid=2028 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:08.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326137626161663132323538313635326237396432356236333061 Sep 13 00:55:08.257080 env[1438]: time="2025-09-13T00:55:08.257052844Z" level=info msg="StartContainer for \"ce2a7baaf122581652b79d25b630aceef41f1ea9e8c7c75481040d447b044af2\" returns successfully" Sep 13 00:55:08.264847 systemd[1]: cri-containerd-ce2a7baaf122581652b79d25b630aceef41f1ea9e8c7c75481040d447b044af2.scope: Deactivated successfully. Sep 13 00:55:08.267000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:55:08.407752 env[1438]: time="2025-09-13T00:55:08.407706457Z" level=info msg="shim disconnected" id=ce2a7baaf122581652b79d25b630aceef41f1ea9e8c7c75481040d447b044af2 Sep 13 00:55:08.407752 env[1438]: time="2025-09-13T00:55:08.407751557Z" level=warning msg="cleaning up after shim disconnected" id=ce2a7baaf122581652b79d25b630aceef41f1ea9e8c7c75481040d447b044af2 namespace=k8s.io Sep 13 00:55:08.408013 env[1438]: time="2025-09-13T00:55:08.407763057Z" level=info msg="cleaning up dead shim" Sep 13 00:55:08.414764 env[1438]: time="2025-09-13T00:55:08.414723167Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:55:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2151 runtime=io.containerd.runc.v2\n" Sep 13 00:55:08.983782 kubelet[1974]: E0913 00:55:08.983754 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:09.663803 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3941766485.mount: Deactivated successfully. Sep 13 00:55:09.984056 kubelet[1974]: E0913 00:55:09.983962 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:10.061330 kubelet[1974]: E0913 00:55:10.061269 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:10.402254 env[1438]: time="2025-09-13T00:55:10.402191808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:10.407473 env[1438]: time="2025-09-13T00:55:10.407440715Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:10.413014 env[1438]: time="2025-09-13T00:55:10.412988523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:10.415820 env[1438]: time="2025-09-13T00:55:10.415793527Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:10.416171 env[1438]: time="2025-09-13T00:55:10.416145327Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Sep 13 00:55:10.417330 env[1438]: time="2025-09-13T00:55:10.417289229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:55:10.422144 env[1438]: time="2025-09-13T00:55:10.422116535Z" level=info msg="CreateContainer within sandbox \"4cd6d6fb00c845e63146b728193f5e456efb01bc10f577a8a63b2a42f81145f0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:55:10.446651 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2235416515.mount: Deactivated successfully. Sep 13 00:55:10.453473 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1993294054.mount: Deactivated successfully. Sep 13 00:55:10.466961 env[1438]: time="2025-09-13T00:55:10.466918495Z" level=info msg="CreateContainer within sandbox \"4cd6d6fb00c845e63146b728193f5e456efb01bc10f577a8a63b2a42f81145f0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9cf2ecd404cebc6fe3bf3600f634da2a588af55a4b576a80bedcf4ae982e3159\"" Sep 13 00:55:10.467486 env[1438]: time="2025-09-13T00:55:10.467462296Z" level=info msg="StartContainer for \"9cf2ecd404cebc6fe3bf3600f634da2a588af55a4b576a80bedcf4ae982e3159\"" Sep 13 00:55:10.484191 systemd[1]: Started cri-containerd-9cf2ecd404cebc6fe3bf3600f634da2a588af55a4b576a80bedcf4ae982e3159.scope. Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fb6e017a4d8 items=0 ppid=2043 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663265636434303463656263366665336266333630306636333464 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit: BPF prog-id=67 op=LOAD Sep 13 00:55:10.497000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000218a88 items=0 ppid=2043 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663265636434303463656263366665336266333630306636333464 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.497000 audit: BPF prog-id=68 op=LOAD Sep 13 00:55:10.497000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000218ad8 items=0 ppid=2043 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663265636434303463656263366665336266333630306636333464 Sep 13 00:55:10.498000 audit: BPF prog-id=68 op=UNLOAD Sep 13 00:55:10.498000 audit: BPF prog-id=67 op=UNLOAD Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:10.498000 audit: BPF prog-id=69 op=LOAD Sep 13 00:55:10.498000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000218b68 items=0 ppid=2043 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663265636434303463656263366665336266333630306636333464 Sep 13 00:55:10.515712 env[1438]: time="2025-09-13T00:55:10.515670660Z" level=info msg="StartContainer for \"9cf2ecd404cebc6fe3bf3600f634da2a588af55a4b576a80bedcf4ae982e3159\" returns successfully" Sep 13 00:55:10.644000 audit[2238]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:10.644000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3ad6c8d0 a2=0 a3=7fff3ad6c8bc items=0 ppid=2187 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:55:10.645000 audit[2237]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.645000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6a2672b0 a2=0 a3=7ffd6a26729c items=0 ppid=2187 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:55:10.647000 audit[2240]: NETFILTER_CFG table=nat:19 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:10.647000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9ec39960 a2=0 a3=7fff9ec3994c items=0 ppid=2187 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:55:10.648000 audit[2241]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.648000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0cb52460 a2=0 a3=7ffc0cb5244c items=0 ppid=2187 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:55:10.650000 audit[2243]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:10.650000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcb28df80 a2=0 a3=7fffcb28df6c items=0 ppid=2187 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:55:10.652000 audit[2245]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.652000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdb504650 a2=0 a3=7fffdb50463c items=0 ppid=2187 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:55:10.748000 audit[2246]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.748000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc4ec1f360 a2=0 a3=7ffc4ec1f34c items=0 ppid=2187 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:55:10.751000 audit[2248]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.751000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff2d8710c0 a2=0 a3=7fff2d8710ac items=0 ppid=2187 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:55:10.754000 audit[2251]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.754000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc47119dc0 a2=0 a3=7ffc47119dac items=0 ppid=2187 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:55:10.756000 audit[2252]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.756000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9159d940 a2=0 a3=7ffe9159d92c items=0 ppid=2187 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:55:10.758000 audit[2254]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.758000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccf1bcce0 a2=0 a3=7ffccf1bcccc items=0 ppid=2187 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:55:10.759000 audit[2255]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.759000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddc857ae0 a2=0 a3=7ffddc857acc items=0 ppid=2187 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:55:10.762000 audit[2257]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.762000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec4121bf0 a2=0 a3=7ffec4121bdc items=0 ppid=2187 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:55:10.765000 audit[2260]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.765000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcae2aeca0 a2=0 a3=7ffcae2aec8c items=0 ppid=2187 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:55:10.766000 audit[2261]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.766000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb2b58580 a2=0 a3=7ffdb2b5856c items=0 ppid=2187 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:55:10.769000 audit[2263]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.769000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea3d2dc10 a2=0 a3=7ffea3d2dbfc items=0 ppid=2187 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:55:10.770000 audit[2264]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.770000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3f3b90d0 a2=0 a3=7ffc3f3b90bc items=0 ppid=2187 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:55:10.773000 audit[2266]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.773000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe93dbfad0 a2=0 a3=7ffe93dbfabc items=0 ppid=2187 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:55:10.776000 audit[2269]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.776000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4704fdd0 a2=0 a3=7ffe4704fdbc items=0 ppid=2187 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:55:10.780000 audit[2272]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.780000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd27540110 a2=0 a3=7ffd275400fc items=0 ppid=2187 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:55:10.781000 audit[2273]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.781000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd0600a20 a2=0 a3=7ffdd0600a0c items=0 ppid=2187 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:55:10.783000 audit[2275]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.783000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeca3c5e00 a2=0 a3=7ffeca3c5dec items=0 ppid=2187 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:55:10.876000 audit[2279]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.876000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcb7acde60 a2=0 a3=7ffcb7acde4c items=0 ppid=2187 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:55:10.878000 audit[2280]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.878000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff09b437a0 a2=0 a3=7fff09b4378c items=0 ppid=2187 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:55:10.880000 audit[2282]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:55:10.880000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcb63959f0 a2=0 a3=7ffcb63959dc items=0 ppid=2187 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:55:10.925000 audit[2288]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:10.925000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff51386fe0 a2=0 a3=7fff51386fcc items=0 ppid=2187 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:10.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:10.984340 kubelet[1974]: E0913 00:55:10.984306 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:11.066000 audit[2288]: NETFILTER_CFG table=nat:43 family=2 entries=79 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:11.066000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=38092 a0=3 a1=7fff51386fe0 a2=0 a3=7fff51386fcc items=0 ppid=2187 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:11.090505 kubelet[1974]: I0913 00:55:11.090450 1974 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2859r" podStartSLOduration=6.300291269 podStartE2EDuration="10.090437127s" podCreationTimestamp="2025-09-13 00:55:01 +0000 UTC" firstStartedPulling="2025-09-13 00:55:06.62696947 +0000 UTC m=+6.727515846" lastFinishedPulling="2025-09-13 00:55:10.417115328 +0000 UTC m=+10.517661704" observedRunningTime="2025-09-13 00:55:11.090301927 +0000 UTC m=+11.190848303" watchObservedRunningTime="2025-09-13 00:55:11.090437127 +0000 UTC m=+11.190983503" Sep 13 00:55:11.110000 audit[2296]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.110000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd63058890 a2=0 a3=7ffd6305887c items=0 ppid=2187 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:55:11.113000 audit[2298]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.113000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff1473aee0 a2=0 a3=7fff1473aecc items=0 ppid=2187 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:55:11.117000 audit[2301]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.117000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcee0ac480 a2=0 a3=7ffcee0ac46c items=0 ppid=2187 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:55:11.118000 audit[2302]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.118000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc06c63bd0 a2=0 a3=7ffc06c63bbc items=0 ppid=2187 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:55:11.121000 audit[2304]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.121000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdadaf4900 a2=0 a3=7ffdadaf48ec items=0 ppid=2187 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:55:11.122000 audit[2305]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.122000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc74a9ec0 a2=0 a3=7ffdc74a9eac items=0 ppid=2187 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:55:11.125000 audit[2307]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.125000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe939d84f0 a2=0 a3=7ffe939d84dc items=0 ppid=2187 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:55:11.130000 audit[2310]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.130000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd385d6690 a2=0 a3=7ffd385d667c items=0 ppid=2187 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:55:11.131000 audit[2311]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.131000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc956fac80 a2=0 a3=7ffc956fac6c items=0 ppid=2187 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:55:11.133000 audit[2313]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.133000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3bf48260 a2=0 a3=7ffd3bf4824c items=0 ppid=2187 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:55:11.135000 audit[2314]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.135000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff6272aa0 a2=0 a3=7ffff6272a8c items=0 ppid=2187 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:55:11.138000 audit[2316]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.138000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb4468430 a2=0 a3=7fffb446841c items=0 ppid=2187 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:55:11.141000 audit[2319]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.141000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffabefbd80 a2=0 a3=7fffabefbd6c items=0 ppid=2187 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:55:11.145000 audit[2322]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.145000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd181074b0 a2=0 a3=7ffd1810749c items=0 ppid=2187 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:55:11.147000 audit[2323]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.147000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcbfbf4910 a2=0 a3=7ffcbfbf48fc items=0 ppid=2187 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:55:11.149000 audit[2325]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.149000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe07f3e340 a2=0 a3=7ffe07f3e32c items=0 ppid=2187 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:55:11.152000 audit[2328]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.152000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc3d72a3f0 a2=0 a3=7ffc3d72a3dc items=0 ppid=2187 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:55:11.154000 audit[2329]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.154000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07974580 a2=0 a3=7ffe0797456c items=0 ppid=2187 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:55:11.156000 audit[2331]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.156000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe349e4410 a2=0 a3=7ffe349e43fc items=0 ppid=2187 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:55:11.158000 audit[2332]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.158000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe93584ef0 a2=0 a3=7ffe93584edc items=0 ppid=2187 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:55:11.160000 audit[2334]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.160000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffcf41cdd0 a2=0 a3=7fffcf41cdbc items=0 ppid=2187 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:55:11.163000 audit[2337]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:55:11.163000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc1d9aaec0 a2=0 a3=7ffc1d9aaeac items=0 ppid=2187 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:55:11.166000 audit[2339]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:55:11.166000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff073de3e0 a2=0 a3=7fff073de3cc items=0 ppid=2187 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.166000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:11.166000 audit[2339]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:55:11.166000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff073de3e0 a2=0 a3=7fff073de3cc items=0 ppid=2187 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:11.166000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:11.985090 kubelet[1974]: E0913 00:55:11.985052 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:12.061333 kubelet[1974]: E0913 00:55:12.060953 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:12.986155 kubelet[1974]: E0913 00:55:12.986115 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:13.987172 kubelet[1974]: E0913 00:55:13.987119 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:14.061361 kubelet[1974]: E0913 00:55:14.060900 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:14.906878 env[1438]: time="2025-09-13T00:55:14.906834405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:14.911275 env[1438]: time="2025-09-13T00:55:14.911242110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:14.914091 env[1438]: time="2025-09-13T00:55:14.914059613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:14.917518 env[1438]: time="2025-09-13T00:55:14.917493217Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:14.917890 env[1438]: time="2025-09-13T00:55:14.917851718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:55:14.924276 env[1438]: time="2025-09-13T00:55:14.924060425Z" level=info msg="CreateContainer within sandbox \"da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:55:14.961927 env[1438]: time="2025-09-13T00:55:14.961892671Z" level=info msg="CreateContainer within sandbox \"da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6\"" Sep 13 00:55:14.962400 env[1438]: time="2025-09-13T00:55:14.962369871Z" level=info msg="StartContainer for \"59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6\"" Sep 13 00:55:14.986974 systemd[1]: run-containerd-runc-k8s.io-59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6-runc.yDkGN1.mount: Deactivated successfully. Sep 13 00:55:14.989225 kubelet[1974]: E0913 00:55:14.987781 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:14.993134 systemd[1]: Started cri-containerd-59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6.scope. Sep 13 00:55:15.005000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.012032 kernel: kauditd_printk_skb: 346 callbacks suppressed Sep 13 00:55:15.012112 kernel: audit: type=1400 audit(1757724915.005:516): avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.005000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f15c4fd1098 items=0 ppid=2028 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:15.047872 kernel: audit: type=1300 audit(1757724915.005:516): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f15c4fd1098 items=0 ppid=2028 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:15.047902 kernel: audit: type=1327 audit(1757724915.005:516): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539616637393438636234653434636232376534646562653437663135 Sep 13 00:55:15.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539616637393438636234653434636232376534646562653437663135 Sep 13 00:55:15.081420 kernel: audit: type=1400 audit(1757724915.009:517): avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.110318 kernel: audit: type=1400 audit(1757724915.009:517): avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.110395 kernel: audit: type=1400 audit(1757724915.009:517): avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.124340 kernel: audit: type=1400 audit(1757724915.009:517): avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.139455 kernel: audit: type=1400 audit(1757724915.009:517): avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.154154 kernel: audit: type=1400 audit(1757724915.009:517): avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.154280 env[1438]: time="2025-09-13T00:55:15.146041687Z" level=info msg="StartContainer for \"59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6\" returns successfully" Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.168220 kernel: audit: type=1400 audit(1757724915.009:517): avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.009000 audit: BPF prog-id=70 op=LOAD Sep 13 00:55:15.009000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ae1f8 items=0 ppid=2028 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:15.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539616637393438636234653434636232376534646562653437663135 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.024000 audit: BPF prog-id=71 op=LOAD Sep 13 00:55:15.024000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ae248 items=0 ppid=2028 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:15.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539616637393438636234653434636232376534646562653437663135 Sep 13 00:55:15.081000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:55:15.081000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:15.081000 audit: BPF prog-id=72 op=LOAD Sep 13 00:55:15.081000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ae2d8 items=0 ppid=2028 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:15.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539616637393438636234653434636232376534646562653437663135 Sep 13 00:55:15.987935 kubelet[1974]: E0913 00:55:15.987901 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:16.061265 kubelet[1974]: E0913 00:55:16.061229 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:16.743915 env[1438]: time="2025-09-13T00:55:16.743795934Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:55:16.745926 systemd[1]: cri-containerd-59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6.scope: Deactivated successfully. Sep 13 00:55:16.751000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:55:16.765082 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6-rootfs.mount: Deactivated successfully. Sep 13 00:55:16.838752 kubelet[1974]: I0913 00:55:16.838721 1974 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:55:16.988650 kubelet[1974]: E0913 00:55:16.988610 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:17.988869 kubelet[1974]: E0913 00:55:17.988828 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:18.065159 systemd[1]: Created slice kubepods-besteffort-podda606d41_78bf_44c8_a819_bc90e65bd4e7.slice. Sep 13 00:55:18.067549 env[1438]: time="2025-09-13T00:55:18.067513409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xppb6,Uid:da606d41-78bf-44c8-a819-bc90e65bd4e7,Namespace:calico-system,Attempt:0,}" Sep 13 00:55:18.811692 env[1438]: time="2025-09-13T00:55:18.811638614Z" level=info msg="shim disconnected" id=59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6 Sep 13 00:55:18.811692 env[1438]: time="2025-09-13T00:55:18.811687614Z" level=warning msg="cleaning up after shim disconnected" id=59af7948cb4e44cb27e4debe47f15110e7bf6943a73e1e7a0477e65c4d95c2f6 namespace=k8s.io Sep 13 00:55:18.811692 env[1438]: time="2025-09-13T00:55:18.811699314Z" level=info msg="cleaning up dead shim" Sep 13 00:55:18.824126 env[1438]: time="2025-09-13T00:55:18.824083727Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:55:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2386 runtime=io.containerd.runc.v2\ntime=\"2025-09-13T00:55:18Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Sep 13 00:55:18.876839 env[1438]: time="2025-09-13T00:55:18.876773484Z" level=error msg="Failed to destroy network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:18.877513 env[1438]: time="2025-09-13T00:55:18.877470185Z" level=error msg="encountered an error cleaning up failed sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:18.877698 env[1438]: time="2025-09-13T00:55:18.877654585Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xppb6,Uid:da606d41-78bf-44c8-a819-bc90e65bd4e7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:18.878811 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0-shm.mount: Deactivated successfully. Sep 13 00:55:18.880849 kubelet[1974]: E0913 00:55:18.880224 1974 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:18.880849 kubelet[1974]: E0913 00:55:18.880317 1974 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xppb6" Sep 13 00:55:18.880849 kubelet[1974]: E0913 00:55:18.880351 1974 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xppb6" Sep 13 00:55:18.880989 kubelet[1974]: E0913 00:55:18.880428 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xppb6_calico-system(da606d41-78bf-44c8-a819-bc90e65bd4e7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xppb6_calico-system(da606d41-78bf-44c8-a819-bc90e65bd4e7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:18.989581 kubelet[1974]: E0913 00:55:18.989536 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:19.095593 env[1438]: time="2025-09-13T00:55:19.094867218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:55:19.095967 kubelet[1974]: I0913 00:55:19.094963 1974 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:55:19.096364 env[1438]: time="2025-09-13T00:55:19.095661819Z" level=info msg="StopPodSandbox for \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\"" Sep 13 00:55:19.123044 env[1438]: time="2025-09-13T00:55:19.122998647Z" level=error msg="StopPodSandbox for \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\" failed" error="failed to destroy network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:19.123352 kubelet[1974]: E0913 00:55:19.123321 1974 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:55:19.123461 kubelet[1974]: E0913 00:55:19.123367 1974 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0"} Sep 13 00:55:19.123461 kubelet[1974]: E0913 00:55:19.123425 1974 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da606d41-78bf-44c8-a819-bc90e65bd4e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:55:19.123560 kubelet[1974]: E0913 00:55:19.123455 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da606d41-78bf-44c8-a819-bc90e65bd4e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xppb6" podUID="da606d41-78bf-44c8-a819-bc90e65bd4e7" Sep 13 00:55:19.990471 kubelet[1974]: E0913 00:55:19.990436 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:20.974545 kubelet[1974]: E0913 00:55:20.974514 1974 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:20.991079 kubelet[1974]: E0913 00:55:20.991055 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:21.991264 kubelet[1974]: E0913 00:55:21.991188 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:22.606586 systemd[1]: Created slice kubepods-besteffort-pod56fc3f08_aebe_47a4_aba7_ad57ee748ed2.slice. Sep 13 00:55:22.650812 kubelet[1974]: I0913 00:55:22.650744 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttqgt\" (UniqueName: \"kubernetes.io/projected/56fc3f08-aebe-47a4-aba7-ad57ee748ed2-kube-api-access-ttqgt\") pod \"nginx-deployment-7fcdb87857-cq26l\" (UID: \"56fc3f08-aebe-47a4-aba7-ad57ee748ed2\") " pod="default/nginx-deployment-7fcdb87857-cq26l" Sep 13 00:55:22.909782 env[1438]: time="2025-09-13T00:55:22.909737785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cq26l,Uid:56fc3f08-aebe-47a4-aba7-ad57ee748ed2,Namespace:default,Attempt:0,}" Sep 13 00:55:22.991590 kubelet[1974]: E0913 00:55:22.991535 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:23.000614 env[1438]: time="2025-09-13T00:55:23.000551374Z" level=error msg="Failed to destroy network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:23.003704 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63-shm.mount: Deactivated successfully. Sep 13 00:55:23.004543 env[1438]: time="2025-09-13T00:55:23.004498978Z" level=error msg="encountered an error cleaning up failed sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:23.004701 env[1438]: time="2025-09-13T00:55:23.004667878Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cq26l,Uid:56fc3f08-aebe-47a4-aba7-ad57ee748ed2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:23.005164 kubelet[1974]: E0913 00:55:23.005120 1974 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:23.005276 kubelet[1974]: E0913 00:55:23.005186 1974 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-cq26l" Sep 13 00:55:23.005276 kubelet[1974]: E0913 00:55:23.005227 1974 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-cq26l" Sep 13 00:55:23.005354 kubelet[1974]: E0913 00:55:23.005293 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-cq26l_default(56fc3f08-aebe-47a4-aba7-ad57ee748ed2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-cq26l_default(56fc3f08-aebe-47a4-aba7-ad57ee748ed2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-cq26l" podUID="56fc3f08-aebe-47a4-aba7-ad57ee748ed2" Sep 13 00:55:23.100923 kubelet[1974]: I0913 00:55:23.100872 1974 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:55:23.101721 env[1438]: time="2025-09-13T00:55:23.101565270Z" level=info msg="StopPodSandbox for \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\"" Sep 13 00:55:23.135805 env[1438]: time="2025-09-13T00:55:23.135762302Z" level=error msg="StopPodSandbox for \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\" failed" error="failed to destroy network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:55:23.136243 kubelet[1974]: E0913 00:55:23.136114 1974 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:55:23.136243 kubelet[1974]: E0913 00:55:23.136150 1974 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63"} Sep 13 00:55:23.136243 kubelet[1974]: E0913 00:55:23.136182 1974 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"56fc3f08-aebe-47a4-aba7-ad57ee748ed2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:55:23.136243 kubelet[1974]: E0913 00:55:23.136200 1974 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"56fc3f08-aebe-47a4-aba7-ad57ee748ed2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-cq26l" podUID="56fc3f08-aebe-47a4-aba7-ad57ee748ed2" Sep 13 00:55:23.992313 kubelet[1974]: E0913 00:55:23.992272 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:24.992455 kubelet[1974]: E0913 00:55:24.992415 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:25.993510 kubelet[1974]: E0913 00:55:25.993469 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:26.994192 kubelet[1974]: E0913 00:55:26.994155 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:27.994531 kubelet[1974]: E0913 00:55:27.994495 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:28.159777 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2073693972.mount: Deactivated successfully. Sep 13 00:55:28.193766 env[1438]: time="2025-09-13T00:55:28.193721059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:28.198695 env[1438]: time="2025-09-13T00:55:28.198663163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:28.202142 env[1438]: time="2025-09-13T00:55:28.202112866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:28.205727 env[1438]: time="2025-09-13T00:55:28.205701169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:28.206112 env[1438]: time="2025-09-13T00:55:28.206083069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:55:28.224725 env[1438]: time="2025-09-13T00:55:28.224696685Z" level=info msg="CreateContainer within sandbox \"da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:55:28.255298 env[1438]: time="2025-09-13T00:55:28.254839610Z" level=info msg="CreateContainer within sandbox \"da9c56526919896cef9dc9eb803b7a6a9211a09d368a01546742562a72b82c40\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"446bb40ff710aaaa1f27573d1792133b4924c6919cf10c258209b58d77aebe89\"" Sep 13 00:55:28.255562 env[1438]: time="2025-09-13T00:55:28.255525710Z" level=info msg="StartContainer for \"446bb40ff710aaaa1f27573d1792133b4924c6919cf10c258209b58d77aebe89\"" Sep 13 00:55:28.274860 systemd[1]: Started cri-containerd-446bb40ff710aaaa1f27573d1792133b4924c6919cf10c258209b58d77aebe89.scope. Sep 13 00:55:28.312232 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 00:55:28.312345 kernel: audit: type=1400 audit(1757724928.291:523): avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f98802e5568 items=0 ppid=2028 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:28.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366262343066663731306161616131663237353733643137393231 Sep 13 00:55:28.354515 kernel: audit: type=1300 audit(1757724928.291:523): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f98802e5568 items=0 ppid=2028 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:28.354592 kernel: audit: type=1327 audit(1757724928.291:523): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366262343066663731306161616131663237353733643137393231 Sep 13 00:55:28.355227 kernel: audit: type=1400 audit(1757724928.291:524): avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.369854 env[1438]: time="2025-09-13T00:55:28.369802606Z" level=info msg="StartContainer for \"446bb40ff710aaaa1f27573d1792133b4924c6919cf10c258209b58d77aebe89\" returns successfully" Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.385326 kernel: audit: type=1400 audit(1757724928.291:524): avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.385396 kernel: audit: type=1400 audit(1757724928.291:524): avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.429968 kernel: audit: type=1400 audit(1757724928.291:524): avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.430080 kernel: audit: type=1400 audit(1757724928.291:524): avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.430355 kernel: audit: type=1400 audit(1757724928.291:524): avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.444276 kernel: audit: type=1400 audit(1757724928.291:524): avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.291000 audit: BPF prog-id=73 op=LOAD Sep 13 00:55:28.291000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000232888 items=0 ppid=2028 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:28.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366262343066663731306161616131663237353733643137393231 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit: BPF prog-id=74 op=LOAD Sep 13 00:55:28.311000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002328d8 items=0 ppid=2028 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:28.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366262343066663731306161616131663237353733643137393231 Sep 13 00:55:28.311000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:55:28.311000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:28.311000 audit: BPF prog-id=75 op=LOAD Sep 13 00:55:28.311000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000232968 items=0 ppid=2028 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:28.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366262343066663731306161616131663237353733643137393231 Sep 13 00:55:28.824765 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:55:28.824906 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:55:28.994721 kubelet[1974]: E0913 00:55:28.994689 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:29.995159 kubelet[1974]: E0913 00:55:29.995124 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:30.062522 env[1438]: time="2025-09-13T00:55:30.062476604Z" level=info msg="StopPodSandbox for \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\"" Sep 13 00:55:30.088000 audit[2595]: AVC avc: denied { write } for pid=2595 comm="tee" name="fd" dev="proc" ino=22527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:55:30.088000 audit[2595]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff61fa57c8 a2=241 a3=1b6 items=1 ppid=2559 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.088000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:55:30.088000 audit: PATH item=0 name="/dev/fd/63" inode=22521 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:30.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:55:30.116000 audit[2603]: AVC avc: denied { write } for pid=2603 comm="tee" name="fd" dev="proc" ino=23213 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:55:30.120000 audit[2607]: AVC avc: denied { write } for pid=2607 comm="tee" name="fd" dev="proc" ino=23216 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:55:30.116000 audit[2603]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca5e1b7d9 a2=241 a3=1b6 items=1 ppid=2555 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.116000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:55:30.116000 audit: PATH item=0 name="/dev/fd/63" inode=23557 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:30.116000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:55:30.131000 audit[2609]: AVC avc: denied { write } for pid=2609 comm="tee" name="fd" dev="proc" ino=23231 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:55:30.120000 audit[2607]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc35c8a7d8 a2=241 a3=1b6 items=1 ppid=2564 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.120000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:55:30.120000 audit: PATH item=0 name="/dev/fd/63" inode=23562 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:30.120000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:55:30.131000 audit[2609]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd162397c9 a2=241 a3=1b6 items=1 ppid=2560 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.131000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:55:30.131000 audit: PATH item=0 name="/dev/fd/63" inode=23567 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:30.134576 kubelet[1974]: I0913 00:55:30.134199 1974 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zlfjd" podStartSLOduration=7.472206338 podStartE2EDuration="29.134174561s" podCreationTimestamp="2025-09-13 00:55:01 +0000 UTC" firstStartedPulling="2025-09-13 00:55:06.545092047 +0000 UTC m=+6.645638523" lastFinishedPulling="2025-09-13 00:55:28.20706027 +0000 UTC m=+28.307606746" observedRunningTime="2025-09-13 00:55:29.125579538 +0000 UTC m=+29.226126014" watchObservedRunningTime="2025-09-13 00:55:30.134174561 +0000 UTC m=+30.234720937" Sep 13 00:55:30.131000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:55:30.166000 audit[2634]: AVC avc: denied { write } for pid=2634 comm="tee" name="fd" dev="proc" ino=23248 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:55:30.172000 audit[2646]: AVC avc: denied { write } for pid=2646 comm="tee" name="fd" dev="proc" ino=23592 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:55:30.172000 audit[2646]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb83197da a2=241 a3=1b6 items=1 ppid=2566 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.172000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:55:30.172000 audit: PATH item=0 name="/dev/fd/63" inode=23588 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:30.172000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:55:30.173000 audit[2620]: AVC avc: denied { write } for pid=2620 comm="tee" name="fd" dev="proc" ino=23251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:55:30.166000 audit[2634]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd804ce7d8 a2=241 a3=1b6 items=1 ppid=2580 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.166000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:55:30.166000 audit: PATH item=0 name="/dev/fd/63" inode=23583 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:30.166000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:55:30.173000 audit[2620]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6a3107d8 a2=241 a3=1b6 items=1 ppid=2563 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.173000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:55:30.173000 audit: PATH item=0 name="/dev/fd/63" inode=23227 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:55:30.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.134 [INFO][2582] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.134 [INFO][2582] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" iface="eth0" netns="/var/run/netns/cni-35ebbd29-1413-4a30-514f-0beb53b7a47d" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.135 [INFO][2582] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" iface="eth0" netns="/var/run/netns/cni-35ebbd29-1413-4a30-514f-0beb53b7a47d" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.137 [INFO][2582] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" iface="eth0" netns="/var/run/netns/cni-35ebbd29-1413-4a30-514f-0beb53b7a47d" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.140 [INFO][2582] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.140 [INFO][2582] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.178 [INFO][2636] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.179 [INFO][2636] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.179 [INFO][2636] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.186 [WARNING][2636] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.186 [INFO][2636] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.187 [INFO][2636] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:55:30.196025 env[1438]: 2025-09-13 00:55:30.193 [INFO][2582] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:55:30.200463 systemd[1]: run-netns-cni\x2d35ebbd29\x2d1413\x2d4a30\x2d514f\x2d0beb53b7a47d.mount: Deactivated successfully. Sep 13 00:55:30.201598 env[1438]: time="2025-09-13T00:55:30.201543815Z" level=info msg="TearDown network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\" successfully" Sep 13 00:55:30.201744 env[1438]: time="2025-09-13T00:55:30.201720415Z" level=info msg="StopPodSandbox for \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\" returns successfully" Sep 13 00:55:30.202648 env[1438]: time="2025-09-13T00:55:30.202621116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xppb6,Uid:da606d41-78bf-44c8-a819-bc90e65bd4e7,Namespace:calico-system,Attempt:1,}" Sep 13 00:55:30.447565 systemd-networkd[1604]: cali1115b627312: Link UP Sep 13 00:55:30.456266 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1115b627312: link becomes ready Sep 13 00:55:30.463610 systemd-networkd[1604]: cali1115b627312: Gained carrier Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.294 [INFO][2654] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.314 [INFO][2654] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-csi--node--driver--xppb6-eth0 csi-node-driver- calico-system da606d41-78bf-44c8-a819-bc90e65bd4e7 1472 0 2025-09-13 00:55:01 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.4.18 csi-node-driver-xppb6 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1115b627312 [] [] }} ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.314 [INFO][2654] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.356 [INFO][2666] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" HandleID="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.358 [INFO][2666] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" HandleID="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025b610), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.4.18", "pod":"csi-node-driver-xppb6", "timestamp":"2025-09-13 00:55:30.356049039 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.358 [INFO][2666] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.358 [INFO][2666] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.358 [INFO][2666] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.367 [INFO][2666] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.372 [INFO][2666] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.375 [INFO][2666] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.376 [INFO][2666] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.378 [INFO][2666] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.378 [INFO][2666] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.381 [INFO][2666] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5 Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.385 [INFO][2666] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.391 [INFO][2666] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.65/26] block=192.168.76.64/26 handle="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.391 [INFO][2666] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.65/26] handle="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" host="10.200.4.18" Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.391 [INFO][2666] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:55:30.477487 env[1438]: 2025-09-13 00:55:30.392 [INFO][2666] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.65/26] IPv6=[] ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" HandleID="k8s-pod-network.4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.478114 env[1438]: 2025-09-13 00:55:30.399 [INFO][2654] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xppb6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"da606d41-78bf-44c8-a819-bc90e65bd4e7", ResourceVersion:"1472", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"csi-node-driver-xppb6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1115b627312", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:30.478114 env[1438]: 2025-09-13 00:55:30.399 [INFO][2654] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.65/32] ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.478114 env[1438]: 2025-09-13 00:55:30.400 [INFO][2654] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1115b627312 ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.478114 env[1438]: 2025-09-13 00:55:30.448 [INFO][2654] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.478114 env[1438]: 2025-09-13 00:55:30.463 [INFO][2654] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xppb6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"da606d41-78bf-44c8-a819-bc90e65bd4e7", ResourceVersion:"1472", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5", Pod:"csi-node-driver-xppb6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1115b627312", MAC:"52:67:38:95:4a:49", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:30.478114 env[1438]: 2025-09-13 00:55:30.476 [INFO][2654] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5" Namespace="calico-system" Pod="csi-node-driver-xppb6" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:55:30.492116 env[1438]: time="2025-09-13T00:55:30.492045547Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:30.492323 env[1438]: time="2025-09-13T00:55:30.492299847Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:30.492427 env[1438]: time="2025-09-13T00:55:30.492408947Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:30.492710 env[1438]: time="2025-09-13T00:55:30.492658948Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5 pid=2707 runtime=io.containerd.runc.v2 Sep 13 00:55:30.515826 systemd[1]: Started cri-containerd-4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5.scope. Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit: BPF prog-id=76 op=LOAD Sep 13 00:55:30.525000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.525000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2707 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463633965326463353363303836663434323838656232346230653031 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2707 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463633965326463353363303836663434323838656232346230653031 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit: BPF prog-id=77 op=LOAD Sep 13 00:55:30.526000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027a820 items=0 ppid=2707 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463633965326463353363303836663434323838656232346230653031 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit: BPF prog-id=78 op=LOAD Sep 13 00:55:30.526000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027a868 items=0 ppid=2707 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463633965326463353363303836663434323838656232346230653031 Sep 13 00:55:30.526000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:55:30.526000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.526000 audit: BPF prog-id=79 op=LOAD Sep 13 00:55:30.526000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00027ac78 items=0 ppid=2707 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463633965326463353363303836663434323838656232346230653031 Sep 13 00:55:30.537857 env[1438]: time="2025-09-13T00:55:30.537815484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xppb6,Uid:da606d41-78bf-44c8-a819-bc90e65bd4e7,Namespace:calico-system,Attempt:1,} returns sandbox id \"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5\"" Sep 13 00:55:30.539571 env[1438]: time="2025-09-13T00:55:30.539550085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit: BPF prog-id=80 op=LOAD Sep 13 00:55:30.601000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff5ba48b0 a2=98 a3=1fffffffffffffff items=0 ppid=2569 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.601000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:55:30.601000 audit: BPF prog-id=80 op=UNLOAD Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit: BPF prog-id=81 op=LOAD Sep 13 00:55:30.601000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff5ba4790 a2=94 a3=3 items=0 ppid=2569 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.601000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:55:30.601000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit: BPF prog-id=82 op=LOAD Sep 13 00:55:30.601000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff5ba47d0 a2=94 a3=7ffff5ba49b0 items=0 ppid=2569 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.601000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:55:30.601000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:55:30.601000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.601000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffff5ba48a0 a2=50 a3=a000000085 items=0 ppid=2569 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.601000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit: BPF prog-id=83 op=LOAD Sep 13 00:55:30.603000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4b333eb0 a2=98 a3=3 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.603000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.603000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit: BPF prog-id=84 op=LOAD Sep 13 00:55:30.603000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4b333ca0 a2=94 a3=54428f items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.603000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.603000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.603000 audit: BPF prog-id=85 op=LOAD Sep 13 00:55:30.603000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4b333cd0 a2=94 a3=2 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.603000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.603000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.709000 audit: BPF prog-id=86 op=LOAD Sep 13 00:55:30.709000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4b333b90 a2=94 a3=1 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.709000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.710000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:55:30.710000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.710000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe4b333c60 a2=50 a3=7ffe4b333d40 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.710000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.723000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.723000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4b333ba0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.723000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.723000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4b333bd0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.723000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.723000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4b333ae0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.723000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.723000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4b333bf0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.723000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.723000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4b333bd0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.723000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.723000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4b333bc0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.723000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.723000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4b333bf0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4b333bd0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4b333bf0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4b333bc0 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4b333c30 a2=28 a3=0 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4b3339e0 a2=50 a3=1 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit: BPF prog-id=87 op=LOAD Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4b3339e0 a2=94 a3=5 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4b333a90 a2=50 a3=1 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe4b333bb0 a2=4 a3=38 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.724000 audit[2754]: AVC avc: denied { confidentiality } for pid=2754 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:30.724000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4b333c00 a2=94 a3=6 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.724000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { confidentiality } for pid=2754 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:30.725000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4b3333b0 a2=94 a3=88 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.725000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.725000 audit[2754]: AVC avc: denied { confidentiality } for pid=2754 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:30.725000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4b3333b0 a2=94 a3=88 items=0 ppid=2569 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.725000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.732000 audit: BPF prog-id=88 op=LOAD Sep 13 00:55:30.732000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd64aee810 a2=98 a3=1999999999999999 items=0 ppid=2569 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.732000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:55:30.733000 audit: BPF prog-id=88 op=UNLOAD Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit: BPF prog-id=89 op=LOAD Sep 13 00:55:30.733000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd64aee6f0 a2=94 a3=ffff items=0 ppid=2569 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.733000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:55:30.733000 audit: BPF prog-id=89 op=UNLOAD Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.733000 audit: BPF prog-id=90 op=LOAD Sep 13 00:55:30.733000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd64aee730 a2=94 a3=7ffd64aee910 items=0 ppid=2569 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.733000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:55:30.733000 audit: BPF prog-id=90 op=UNLOAD Sep 13 00:55:30.900775 systemd-networkd[1604]: vxlan.calico: Link UP Sep 13 00:55:30.900788 systemd-networkd[1604]: vxlan.calico: Gained carrier Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit: BPF prog-id=91 op=LOAD Sep 13 00:55:30.920000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee08b3e70 a2=98 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.920000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.920000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.920000 audit: BPF prog-id=92 op=LOAD Sep 13 00:55:30.920000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee08b3c80 a2=94 a3=54428f items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.920000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit: BPF prog-id=92 op=UNLOAD Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit: BPF prog-id=93 op=LOAD Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee08b3cb0 a2=94 a3=2 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit: BPF prog-id=93 op=UNLOAD Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee08b3b80 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee08b3bb0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee08b3ac0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee08b3bd0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee08b3bb0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee08b3ba0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee08b3bd0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee08b3bb0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee08b3bd0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee08b3ba0 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee08b3c10 a2=28 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.921000 audit: BPF prog-id=94 op=LOAD Sep 13 00:55:30.921000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee08b3a80 a2=94 a3=0 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.921000 audit: BPF prog-id=94 op=UNLOAD Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffee08b3a70 a2=50 a3=2800 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffee08b3a70 a2=50 a3=2800 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit: BPF prog-id=95 op=LOAD Sep 13 00:55:30.922000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee08b3290 a2=94 a3=2 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.922000 audit: BPF prog-id=95 op=UNLOAD Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { perfmon } for pid=2783 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit[2783]: AVC avc: denied { bpf } for pid=2783 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.922000 audit: BPF prog-id=96 op=LOAD Sep 13 00:55:30.922000 audit[2783]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee08b3390 a2=94 a3=30 items=0 ppid=2569 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.922000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit: BPF prog-id=97 op=LOAD Sep 13 00:55:30.927000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff50495a20 a2=98 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.927000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:30.927000 audit: BPF prog-id=97 op=UNLOAD Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit: BPF prog-id=98 op=LOAD Sep 13 00:55:30.927000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff50495810 a2=94 a3=54428f items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.927000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:30.927000 audit: BPF prog-id=98 op=UNLOAD Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:30.927000 audit: BPF prog-id=99 op=LOAD Sep 13 00:55:30.927000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff50495840 a2=94 a3=2 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:30.927000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:30.928000 audit: BPF prog-id=99 op=UNLOAD Sep 13 00:55:31.003901 kubelet[1974]: E0913 00:55:30.995314 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit: BPF prog-id=100 op=LOAD Sep 13 00:55:31.049000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff50495700 a2=94 a3=1 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.049000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.049000 audit: BPF prog-id=100 op=UNLOAD Sep 13 00:55:31.049000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.049000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff504957d0 a2=50 a3=7fff504958b0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.049000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50495710 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50495740 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50495650 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50495760 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50495740 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50495730 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50495760 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50495740 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50495760 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50495730 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff504957a0 a2=28 a3=0 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff50495550 a2=50 a3=1 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit: BPF prog-id=101 op=LOAD Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff50495550 a2=94 a3=5 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit: BPF prog-id=101 op=UNLOAD Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff50495600 a2=50 a3=1 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.058000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.058000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff50495720 a2=4 a3=38 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.058000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.060000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:31.060000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff50495770 a2=94 a3=6 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:31.061000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff50494f20 a2=94 a3=88 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.061000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:55:31.061000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff50494f20 a2=94 a3=88 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.062000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.062000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff50496950 a2=10 a3=f8f00800 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.062000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.062000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff504967f0 a2=10 a3=3 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.062000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.062000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff50496790 a2=10 a3=3 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.062000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:31.062000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff50496790 a2=10 a3=7 items=0 ppid=2569 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:55:31.069000 audit: BPF prog-id=96 op=UNLOAD Sep 13 00:55:31.288000 audit[2814]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:55:31.288000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdf55d9980 a2=0 a3=7ffdf55d996c items=0 ppid=2569 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.288000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:55:31.321000 audit[2811]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:55:31.321000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd13b2bc50 a2=0 a3=7ffd13b2bc3c items=0 ppid=2569 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.321000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:55:31.414000 audit[2813]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:55:31.414000 audit[2813]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe77766560 a2=0 a3=7ffe7776654c items=0 ppid=2569 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:55:31.425000 audit[2812]: NETFILTER_CFG table=filter:71 family=2 entries=73 op=nft_register_chain pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:55:31.425000 audit[2812]: SYSCALL arch=c000003e syscall=46 success=yes exit=38620 a0=3 a1=7fff9b255260 a2=0 a3=561cb0c14000 items=0 ppid=2569 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:31.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:55:31.538349 systemd-networkd[1604]: cali1115b627312: Gained IPv6LL Sep 13 00:55:31.846310 kubelet[1974]: I0913 00:55:31.846191 1974 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:55:31.969673 systemd[1]: run-containerd-runc-k8s.io-446bb40ff710aaaa1f27573d1792133b4924c6919cf10c258209b58d77aebe89-runc.3tqNZh.mount: Deactivated successfully. Sep 13 00:55:31.995943 kubelet[1974]: E0913 00:55:31.995902 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:32.163385 env[1438]: time="2025-09-13T00:55:32.163337758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:32.169965 env[1438]: time="2025-09-13T00:55:32.169925163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:32.173715 env[1438]: time="2025-09-13T00:55:32.173682366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:32.178562 env[1438]: time="2025-09-13T00:55:32.178533869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:32.178906 env[1438]: time="2025-09-13T00:55:32.178878670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:55:32.187024 env[1438]: time="2025-09-13T00:55:32.185945875Z" level=info msg="CreateContainer within sandbox \"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:55:32.220749 env[1438]: time="2025-09-13T00:55:32.220706601Z" level=info msg="CreateContainer within sandbox \"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c9f44ee1cbade3bde9d3a56f3ed3b603cb08286be043e2dd989ad0cb657b1dc6\"" Sep 13 00:55:32.221532 env[1438]: time="2025-09-13T00:55:32.221483302Z" level=info msg="StartContainer for \"c9f44ee1cbade3bde9d3a56f3ed3b603cb08286be043e2dd989ad0cb657b1dc6\"" Sep 13 00:55:32.238533 systemd[1]: Started cri-containerd-c9f44ee1cbade3bde9d3a56f3ed3b603cb08286be043e2dd989ad0cb657b1dc6.scope. Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1a88a89bd8 items=0 ppid=2707 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:32.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663434656531636261646533626465396433613536663365643362 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.259000 audit: BPF prog-id=102 op=LOAD Sep 13 00:55:32.259000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a08b8 items=0 ppid=2707 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:32.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663434656531636261646533626465396433613536663365643362 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit: BPF prog-id=103 op=LOAD Sep 13 00:55:32.260000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a0908 items=0 ppid=2707 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:32.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663434656531636261646533626465396433613536663365643362 Sep 13 00:55:32.260000 audit: BPF prog-id=103 op=UNLOAD Sep 13 00:55:32.260000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:32.260000 audit: BPF prog-id=104 op=LOAD Sep 13 00:55:32.260000 audit[2880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0998 items=0 ppid=2707 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:32.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339663434656531636261646533626465396433613536663365643362 Sep 13 00:55:32.280955 env[1438]: time="2025-09-13T00:55:32.280911647Z" level=info msg="StartContainer for \"c9f44ee1cbade3bde9d3a56f3ed3b603cb08286be043e2dd989ad0cb657b1dc6\" returns successfully" Sep 13 00:55:32.282195 env[1438]: time="2025-09-13T00:55:32.282165748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:55:32.498426 systemd-networkd[1604]: vxlan.calico: Gained IPv6LL Sep 13 00:55:32.860146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1084959241.mount: Deactivated successfully. Sep 13 00:55:32.996901 kubelet[1974]: E0913 00:55:32.996865 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:33.782719 env[1438]: time="2025-09-13T00:55:33.782670277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.788139 env[1438]: time="2025-09-13T00:55:33.788102681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.792293 env[1438]: time="2025-09-13T00:55:33.792262284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.795886 env[1438]: time="2025-09-13T00:55:33.795856887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:33.796349 env[1438]: time="2025-09-13T00:55:33.796321387Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:55:33.802128 env[1438]: time="2025-09-13T00:55:33.802098192Z" level=info msg="CreateContainer within sandbox \"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:55:33.825808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2355140640.mount: Deactivated successfully. Sep 13 00:55:33.839273 env[1438]: time="2025-09-13T00:55:33.839231519Z" level=info msg="CreateContainer within sandbox \"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a510ccc7041d3a5be6aeeb25f1c6a5655ad7251ac1377fd4a8df595dec378163\"" Sep 13 00:55:33.840019 env[1438]: time="2025-09-13T00:55:33.839935220Z" level=info msg="StartContainer for \"a510ccc7041d3a5be6aeeb25f1c6a5655ad7251ac1377fd4a8df595dec378163\"" Sep 13 00:55:33.862739 systemd[1]: Started cri-containerd-a510ccc7041d3a5be6aeeb25f1c6a5655ad7251ac1377fd4a8df595dec378163.scope. Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.894877 kernel: kauditd_printk_skb: 690 callbacks suppressed Sep 13 00:55:33.895015 kernel: audit: type=1400 audit(1757724933.874:662): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.917361 kernel: audit: type=1300 audit(1757724933.874:662): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6c30684d18 items=0 ppid=2707 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:33.874000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6c30684d18 items=0 ppid=2707 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:33.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135313063636337303431643361356265366165656232356631633661 Sep 13 00:55:33.936917 kernel: audit: type=1327 audit(1757724933.874:662): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135313063636337303431643361356265366165656232356631633661 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.953278 kernel: audit: type=1400 audit(1757724933.874:663): avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.953329 kernel: audit: type=1400 audit(1757724933.874:663): avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.974340 env[1438]: time="2025-09-13T00:55:33.972030818Z" level=info msg="StartContainer for \"a510ccc7041d3a5be6aeeb25f1c6a5655ad7251ac1377fd4a8df595dec378163\" returns successfully" Sep 13 00:55:33.980994 kernel: audit: type=1400 audit(1757724933.874:663): avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.994410 kernel: audit: type=1400 audit(1757724933.874:663): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.994506 kernel: audit: type=1400 audit(1757724933.874:663): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.997907 kubelet[1974]: E0913 00:55:33.997857 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:34.009221 kernel: audit: type=1400 audit(1757724933.874:663): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:34.037317 kernel: audit: type=1400 audit(1757724933.874:663): avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.874000 audit: BPF prog-id=105 op=LOAD Sep 13 00:55:33.874000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f0128 items=0 ppid=2707 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:33.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135313063636337303431643361356265366165656232356631633661 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit: BPF prog-id=106 op=LOAD Sep 13 00:55:33.893000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003f0178 items=0 ppid=2707 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:33.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135313063636337303431643361356265366165656232356631633661 Sep 13 00:55:33.893000 audit: BPF prog-id=106 op=UNLOAD Sep 13 00:55:33.893000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { perfmon } for pid=2915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit[2915]: AVC avc: denied { bpf } for pid=2915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:33.893000 audit: BPF prog-id=107 op=LOAD Sep 13 00:55:33.893000 audit[2915]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003f0208 items=0 ppid=2707 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:33.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135313063636337303431643361356265366165656232356631633661 Sep 13 00:55:34.081570 kubelet[1974]: I0913 00:55:34.081195 1974 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:55:34.081570 kubelet[1974]: I0913 00:55:34.081271 1974 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:55:34.150361 kubelet[1974]: I0913 00:55:34.150311 1974 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xppb6" podStartSLOduration=29.892184145 podStartE2EDuration="33.150295348s" podCreationTimestamp="2025-09-13 00:55:01 +0000 UTC" firstStartedPulling="2025-09-13 00:55:30.539046885 +0000 UTC m=+30.639593261" lastFinishedPulling="2025-09-13 00:55:33.797158088 +0000 UTC m=+33.897704464" observedRunningTime="2025-09-13 00:55:34.150273648 +0000 UTC m=+34.250820124" watchObservedRunningTime="2025-09-13 00:55:34.150295348 +0000 UTC m=+34.250841824" Sep 13 00:55:34.998155 kubelet[1974]: E0913 00:55:34.998113 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:35.999154 kubelet[1974]: E0913 00:55:35.999119 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:37.000158 kubelet[1974]: E0913 00:55:37.000122 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:38.001098 kubelet[1974]: E0913 00:55:38.001059 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:38.061357 env[1438]: time="2025-09-13T00:55:38.061052788Z" level=info msg="StopPodSandbox for \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\"" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.103 [INFO][2963] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.103 [INFO][2963] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" iface="eth0" netns="/var/run/netns/cni-67474323-22fe-64cd-e8a0-8c248d7a1740" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.103 [INFO][2963] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" iface="eth0" netns="/var/run/netns/cni-67474323-22fe-64cd-e8a0-8c248d7a1740" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.103 [INFO][2963] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" iface="eth0" netns="/var/run/netns/cni-67474323-22fe-64cd-e8a0-8c248d7a1740" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.103 [INFO][2963] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.103 [INFO][2963] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.123 [INFO][2971] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.123 [INFO][2971] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.124 [INFO][2971] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.132 [WARNING][2971] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.132 [INFO][2971] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.133 [INFO][2971] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:55:38.135397 env[1438]: 2025-09-13 00:55:38.134 [INFO][2963] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:55:38.140120 env[1438]: time="2025-09-13T00:55:38.138032739Z" level=info msg="TearDown network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\" successfully" Sep 13 00:55:38.140120 env[1438]: time="2025-09-13T00:55:38.138089239Z" level=info msg="StopPodSandbox for \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\" returns successfully" Sep 13 00:55:38.140120 env[1438]: time="2025-09-13T00:55:38.139383940Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cq26l,Uid:56fc3f08-aebe-47a4-aba7-ad57ee748ed2,Namespace:default,Attempt:1,}" Sep 13 00:55:38.137909 systemd[1]: run-netns-cni\x2d67474323\x2d22fe\x2d64cd\x2de8a0\x2d8c248d7a1740.mount: Deactivated successfully. Sep 13 00:55:38.274170 systemd-networkd[1604]: cali080edcb55c2: Link UP Sep 13 00:55:38.286444 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:55:38.286563 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali080edcb55c2: link becomes ready Sep 13 00:55:38.286955 systemd-networkd[1604]: cali080edcb55c2: Gained carrier Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.206 [INFO][2978] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0 nginx-deployment-7fcdb87857- default 56fc3f08-aebe-47a4-aba7-ad57ee748ed2 1509 0 2025-09-13 00:55:22 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.18 nginx-deployment-7fcdb87857-cq26l eth0 default [] [] [kns.default ksa.default.default] cali080edcb55c2 [] [] }} ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.206 [INFO][2978] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.230 [INFO][2990] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" HandleID="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.230 [INFO][2990] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" HandleID="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"nginx-deployment-7fcdb87857-cq26l", "timestamp":"2025-09-13 00:55:38.230621 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.231 [INFO][2990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.231 [INFO][2990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.231 [INFO][2990] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.241 [INFO][2990] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.245 [INFO][2990] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.248 [INFO][2990] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.249 [INFO][2990] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.257 [INFO][2990] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.257 [INFO][2990] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.258 [INFO][2990] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75 Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.262 [INFO][2990] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.269 [INFO][2990] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.66/26] block=192.168.76.64/26 handle="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.269 [INFO][2990] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.66/26] handle="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" host="10.200.4.18" Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.269 [INFO][2990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:55:38.298878 env[1438]: 2025-09-13 00:55:38.269 [INFO][2990] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.66/26] IPv6=[] ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" HandleID="k8s-pod-network.6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.299854 env[1438]: 2025-09-13 00:55:38.271 [INFO][2978] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"56fc3f08-aebe-47a4-aba7-ad57ee748ed2", ResourceVersion:"1509", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-cq26l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali080edcb55c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:38.299854 env[1438]: 2025-09-13 00:55:38.271 [INFO][2978] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.66/32] ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.299854 env[1438]: 2025-09-13 00:55:38.271 [INFO][2978] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali080edcb55c2 ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.299854 env[1438]: 2025-09-13 00:55:38.287 [INFO][2978] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.299854 env[1438]: 2025-09-13 00:55:38.288 [INFO][2978] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"56fc3f08-aebe-47a4-aba7-ad57ee748ed2", ResourceVersion:"1509", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75", Pod:"nginx-deployment-7fcdb87857-cq26l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali080edcb55c2", MAC:"da:10:2c:d8:d1:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:38.299854 env[1438]: 2025-09-13 00:55:38.296 [INFO][2978] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75" Namespace="default" Pod="nginx-deployment-7fcdb87857-cq26l" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:55:38.309000 audit[3008]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:55:38.309000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fffa98c6bc0 a2=0 a3=7fffa98c6bac items=0 ppid=2569 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.309000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:55:38.313873 env[1438]: time="2025-09-13T00:55:38.313795255Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:38.313873 env[1438]: time="2025-09-13T00:55:38.313843255Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:38.313873 env[1438]: time="2025-09-13T00:55:38.313858655Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:38.314234 env[1438]: time="2025-09-13T00:55:38.314176155Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75 pid=3014 runtime=io.containerd.runc.v2 Sep 13 00:55:38.336746 systemd[1]: Started cri-containerd-6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75.scope. Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit: BPF prog-id=108 op=LOAD Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3014 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666653434393336356634303536316161306538366564373231643431 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3014 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666653434393336356634303536316161306538366564373231643431 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit: BPF prog-id=109 op=LOAD Sep 13 00:55:38.348000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b2350 items=0 ppid=3014 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666653434393336356634303536316161306538366564373231643431 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit: BPF prog-id=110 op=LOAD Sep 13 00:55:38.348000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000b2398 items=0 ppid=3014 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666653434393336356634303536316161306538366564373231643431 Sep 13 00:55:38.348000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:55:38.348000 audit: BPF prog-id=109 op=UNLOAD Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { perfmon } for pid=3024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit[3024]: AVC avc: denied { bpf } for pid=3024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:38.348000 audit: BPF prog-id=111 op=LOAD Sep 13 00:55:38.348000 audit[3024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000b27a8 items=0 ppid=3014 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:38.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666653434393336356634303536316161306538366564373231643431 Sep 13 00:55:38.378431 env[1438]: time="2025-09-13T00:55:38.378387598Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-cq26l,Uid:56fc3f08-aebe-47a4-aba7-ad57ee748ed2,Namespace:default,Attempt:1,} returns sandbox id \"6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75\"" Sep 13 00:55:38.379730 env[1438]: time="2025-09-13T00:55:38.379688499Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:55:39.001961 kubelet[1974]: E0913 00:55:39.001927 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:39.138037 systemd[1]: run-containerd-runc-k8s.io-6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75-runc.aXfAas.mount: Deactivated successfully. Sep 13 00:55:40.003144 kubelet[1974]: E0913 00:55:40.003041 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:40.306981 systemd-networkd[1604]: cali080edcb55c2: Gained IPv6LL Sep 13 00:55:40.974344 kubelet[1974]: E0913 00:55:40.974308 1974 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:41.004051 kubelet[1974]: E0913 00:55:41.003994 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:41.389839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount543837378.mount: Deactivated successfully. Sep 13 00:55:42.004632 kubelet[1974]: E0913 00:55:42.004580 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:42.975068 env[1438]: time="2025-09-13T00:55:42.975021003Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:42.980286 env[1438]: time="2025-09-13T00:55:42.980251406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:42.984432 env[1438]: time="2025-09-13T00:55:42.984402009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:42.988506 env[1438]: time="2025-09-13T00:55:42.988474811Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:55:42.989108 env[1438]: time="2025-09-13T00:55:42.989077011Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:55:42.995463 env[1438]: time="2025-09-13T00:55:42.995420915Z" level=info msg="CreateContainer within sandbox \"6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 00:55:43.004847 kubelet[1974]: E0913 00:55:43.004809 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:43.018874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4167352641.mount: Deactivated successfully. Sep 13 00:55:43.033990 env[1438]: time="2025-09-13T00:55:43.033952438Z" level=info msg="CreateContainer within sandbox \"6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ab3828bd180000ba8c53831979dbc33713f8692e948e34a20d4168930b556b16\"" Sep 13 00:55:43.034583 env[1438]: time="2025-09-13T00:55:43.034556439Z" level=info msg="StartContainer for \"ab3828bd180000ba8c53831979dbc33713f8692e948e34a20d4168930b556b16\"" Sep 13 00:55:43.053635 systemd[1]: Started cri-containerd-ab3828bd180000ba8c53831979dbc33713f8692e948e34a20d4168930b556b16.scope. Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.079224 kernel: kauditd_printk_skb: 93 callbacks suppressed Sep 13 00:55:43.079303 kernel: audit: type=1400 audit(1757724943.072:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.125526 kernel: audit: type=1400 audit(1757724943.072:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.125609 kernel: audit: type=1400 audit(1757724943.072:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.140639 kernel: audit: type=1400 audit(1757724943.072:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.141112 kernel: audit: type=1400 audit(1757724943.072:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.168838 kernel: audit: type=1400 audit(1757724943.072:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.168948 kernel: audit: type=1400 audit(1757724943.072:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.184503 kernel: audit: type=1400 audit(1757724943.072:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.213756 kernel: audit: type=1400 audit(1757724943.072:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.213863 kernel: audit: type=1400 audit(1757724943.072:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit: BPF prog-id=112 op=LOAD Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3014 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:43.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333832386264313830303030626138633533383331393739646263 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3014 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:43.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333832386264313830303030626138633533383331393739646263 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.072000 audit: BPF prog-id=113 op=LOAD Sep 13 00:55:43.072000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003a25f0 items=0 ppid=3014 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:43.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333832386264313830303030626138633533383331393739646263 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.093000 audit: BPF prog-id=114 op=LOAD Sep 13 00:55:43.093000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001ce118 items=0 ppid=3014 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:43.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333832386264313830303030626138633533383331393739646263 Sep 13 00:55:43.109000 audit: BPF prog-id=114 op=UNLOAD Sep 13 00:55:43.109000 audit: BPF prog-id=113 op=UNLOAD Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:43.109000 audit: BPF prog-id=115 op=LOAD Sep 13 00:55:43.109000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001ce528 items=0 ppid=3014 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:43.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333832386264313830303030626138633533383331393739646263 Sep 13 00:55:43.235556 env[1438]: time="2025-09-13T00:55:43.235508058Z" level=info msg="StartContainer for \"ab3828bd180000ba8c53831979dbc33713f8692e948e34a20d4168930b556b16\" returns successfully" Sep 13 00:55:44.005548 kubelet[1974]: E0913 00:55:44.005513 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:44.157059 kubelet[1974]: I0913 00:55:44.157007 1974 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-cq26l" podStartSLOduration=17.54596929 podStartE2EDuration="22.156991303s" podCreationTimestamp="2025-09-13 00:55:22 +0000 UTC" firstStartedPulling="2025-09-13 00:55:38.379171499 +0000 UTC m=+38.479717975" lastFinishedPulling="2025-09-13 00:55:42.990193612 +0000 UTC m=+43.090739988" observedRunningTime="2025-09-13 00:55:44.156820803 +0000 UTC m=+44.257367279" watchObservedRunningTime="2025-09-13 00:55:44.156991303 +0000 UTC m=+44.257537679" Sep 13 00:55:45.005668 kubelet[1974]: E0913 00:55:45.005635 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:46.006637 kubelet[1974]: E0913 00:55:46.006593 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:47.006966 kubelet[1974]: E0913 00:55:47.006924 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:48.007929 kubelet[1974]: E0913 00:55:48.007893 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:49.008051 kubelet[1974]: E0913 00:55:49.008016 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:50.008444 kubelet[1974]: E0913 00:55:50.008405 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:51.009349 kubelet[1974]: E0913 00:55:51.009312 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:51.803606 systemd[1]: Created slice kubepods-besteffort-poda607d40a_b3a7_4836_94db_dc2dcf0ad13b.slice. Sep 13 00:55:51.875000 audit[3116]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.882862 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 00:55:51.882957 kernel: audit: type=1325 audit(1757724951.875:705): table=filter:73 family=2 entries=20 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.875000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe6df6d480 a2=0 a3=7ffe6df6d46c items=0 ppid=2187 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.909599 kubelet[1974]: I0913 00:55:51.909573 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l545q\" (UniqueName: \"kubernetes.io/projected/a607d40a-b3a7-4836-94db-dc2dcf0ad13b-kube-api-access-l545q\") pod \"nfs-server-provisioner-0\" (UID: \"a607d40a-b3a7-4836-94db-dc2dcf0ad13b\") " pod="default/nfs-server-provisioner-0" Sep 13 00:55:51.909764 kubelet[1974]: I0913 00:55:51.909750 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a607d40a-b3a7-4836-94db-dc2dcf0ad13b-data\") pod \"nfs-server-provisioner-0\" (UID: \"a607d40a-b3a7-4836-94db-dc2dcf0ad13b\") " pod="default/nfs-server-provisioner-0" Sep 13 00:55:51.915549 kernel: audit: type=1300 audit(1757724951.875:705): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe6df6d480 a2=0 a3=7ffe6df6d46c items=0 ppid=2187 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.915631 kernel: audit: type=1327 audit(1757724951.875:705): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.893000 audit[3116]: NETFILTER_CFG table=nat:74 family=2 entries=26 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.938290 kernel: audit: type=1325 audit(1757724951.893:706): table=nat:74 family=2 entries=26 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.938360 kernel: audit: type=1300 audit(1757724951.893:706): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe6df6d480 a2=0 a3=0 items=0 ppid=2187 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.893000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe6df6d480 a2=0 a3=0 items=0 ppid=2187 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:51.959767 kernel: audit: type=1327 audit(1757724951.893:706): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.979000 audit[3126]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:51.979000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd6d574d20 a2=0 a3=7ffd6d574d0c items=0 ppid=2187 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:52.010033 kubelet[1974]: E0913 00:55:52.010010 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:52.016552 kernel: audit: type=1325 audit(1757724951.979:707): table=filter:75 family=2 entries=32 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:52.016634 kernel: audit: type=1300 audit(1757724951.979:707): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd6d574d20 a2=0 a3=7ffd6d574d0c items=0 ppid=2187 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:52.016665 kernel: audit: type=1327 audit(1757724951.979:707): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:51.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:52.034964 kernel: audit: type=1325 audit(1757724952.020:708): table=nat:76 family=2 entries=26 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:52.020000 audit[3126]: NETFILTER_CFG table=nat:76 family=2 entries=26 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:55:52.020000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffd6d574d20 a2=0 a3=0 items=0 ppid=2187 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:52.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:55:52.109662 env[1438]: time="2025-09-13T00:55:52.109564892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a607d40a-b3a7-4836-94db-dc2dcf0ad13b,Namespace:default,Attempt:0,}" Sep 13 00:55:53.011383 kubelet[1974]: E0913 00:55:53.011344 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:53.540675 systemd-networkd[1604]: cali60e51b789ff: Link UP Sep 13 00:55:53.553624 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:55:53.553840 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 00:55:53.553948 systemd-networkd[1604]: cali60e51b789ff: Gained carrier Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.457 [INFO][3128] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a607d40a-b3a7-4836-94db-dc2dcf0ad13b 1565 0 2025-09-13 00:55:51 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.4.18 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.457 [INFO][3128] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.503 [INFO][3142] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" HandleID="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.503 [INFO][3142] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" HandleID="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 00:55:53.503107575 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.503 [INFO][3142] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.503 [INFO][3142] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.503 [INFO][3142] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.510 [INFO][3142] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.514 [INFO][3142] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.519 [INFO][3142] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.521 [INFO][3142] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.523 [INFO][3142] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.523 [INFO][3142] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.524 [INFO][3142] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89 Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.528 [INFO][3142] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.536 [INFO][3142] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.67/26] block=192.168.76.64/26 handle="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.536 [INFO][3142] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.67/26] handle="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" host="10.200.4.18" Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.536 [INFO][3142] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:55:53.567398 env[1438]: 2025-09-13 00:55:53.536 [INFO][3142] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.67/26] IPv6=[] ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" HandleID="k8s-pod-network.7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:55:53.568528 env[1438]: 2025-09-13 00:55:53.537 [INFO][3128] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a607d40a-b3a7-4836-94db-dc2dcf0ad13b", ResourceVersion:"1565", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:53.568528 env[1438]: 2025-09-13 00:55:53.537 [INFO][3128] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.67/32] ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:55:53.568528 env[1438]: 2025-09-13 00:55:53.537 [INFO][3128] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:55:53.568528 env[1438]: 2025-09-13 00:55:53.555 [INFO][3128] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:55:53.568751 env[1438]: 2025-09-13 00:55:53.555 [INFO][3128] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a607d40a-b3a7-4836-94db-dc2dcf0ad13b", ResourceVersion:"1565", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e2:bc:45:ed:65:31", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:55:53.568751 env[1438]: 2025-09-13 00:55:53.566 [INFO][3128] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:55:53.583256 env[1438]: time="2025-09-13T00:55:53.582781914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:55:53.583256 env[1438]: time="2025-09-13T00:55:53.582852114Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:55:53.583256 env[1438]: time="2025-09-13T00:55:53.582880114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:55:53.583256 env[1438]: time="2025-09-13T00:55:53.583006714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89 pid=3167 runtime=io.containerd.runc.v2 Sep 13 00:55:53.612502 systemd[1]: Started cri-containerd-7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89.scope. Sep 13 00:55:53.620000 audit[3188]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=3188 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:55:53.620000 audit[3188]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffcd20d3190 a2=0 a3=7ffcd20d317c items=0 ppid=2569 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.620000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.628000 audit: BPF prog-id=116 op=LOAD Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3167 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313662343361663439613137373935663933613761366339383764 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3167 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313662343361663439613137373935663933613761366339383764 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit: BPF prog-id=117 op=LOAD Sep 13 00:55:53.629000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c2740 items=0 ppid=3167 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313662343361663439613137373935663933613761366339383764 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.629000 audit: BPF prog-id=118 op=LOAD Sep 13 00:55:53.629000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c2788 items=0 ppid=3167 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313662343361663439613137373935663933613761366339383764 Sep 13 00:55:53.630000 audit: BPF prog-id=118 op=UNLOAD Sep 13 00:55:53.630000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:55:53.630000 audit: BPF prog-id=119 op=LOAD Sep 13 00:55:53.630000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c2b98 items=0 ppid=3167 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:55:53.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313662343361663439613137373935663933613761366339383764 Sep 13 00:55:53.658085 env[1438]: time="2025-09-13T00:55:53.657077850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a607d40a-b3a7-4836-94db-dc2dcf0ad13b,Namespace:default,Attempt:0,} returns sandbox id \"7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89\"" Sep 13 00:55:53.658973 env[1438]: time="2025-09-13T00:55:53.658942951Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 00:55:54.011760 kubelet[1974]: E0913 00:55:54.011728 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:54.578378 systemd-networkd[1604]: cali60e51b789ff: Gained IPv6LL Sep 13 00:55:55.012214 kubelet[1974]: E0913 00:55:55.012161 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:56.012921 kubelet[1974]: E0913 00:55:56.012884 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:57.013516 kubelet[1974]: E0913 00:55:57.013472 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:58.014443 kubelet[1974]: E0913 00:55:58.014404 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:55:58.648861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1522709969.mount: Deactivated successfully. Sep 13 00:55:59.015179 kubelet[1974]: E0913 00:55:59.014847 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:00.015367 kubelet[1974]: E0913 00:56:00.015298 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:00.974583 kubelet[1974]: E0913 00:56:00.974549 1974 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:01.469094 kubelet[1974]: E0913 00:56:01.015918 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:01.469451 env[1438]: time="2025-09-13T00:56:01.011415267Z" level=info msg="StopPodSandbox for \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\"" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.046 [WARNING][3214] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xppb6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"da606d41-78bf-44c8-a819-bc90e65bd4e7", ResourceVersion:"1499", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5", Pod:"csi-node-driver-xppb6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1115b627312", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.046 [INFO][3214] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.046 [INFO][3214] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" iface="eth0" netns="" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.046 [INFO][3214] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.046 [INFO][3214] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.074 [INFO][3222] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.074 [INFO][3222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.074 [INFO][3222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.081 [WARNING][3222] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.081 [INFO][3222] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.082 [INFO][3222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:01.469451 env[1438]: 2025-09-13 00:56:01.083 [INFO][3214] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.469451 env[1438]: time="2025-09-13T00:56:01.084487598Z" level=info msg="TearDown network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\" successfully" Sep 13 00:56:01.469451 env[1438]: time="2025-09-13T00:56:01.084527798Z" level=info msg="StopPodSandbox for \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\" returns successfully" Sep 13 00:56:01.469451 env[1438]: time="2025-09-13T00:56:01.085025898Z" level=info msg="RemovePodSandbox for \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\"" Sep 13 00:56:01.469451 env[1438]: time="2025-09-13T00:56:01.085061898Z" level=info msg="Forcibly stopping sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\"" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.122 [WARNING][3239] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xppb6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"da606d41-78bf-44c8-a819-bc90e65bd4e7", ResourceVersion:"1499", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"4cc9e2dc53c086f44288eb24b0e0190377d3b3196ea745c05c37f4a6e9c139c5", Pod:"csi-node-driver-xppb6", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1115b627312", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.122 [INFO][3239] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.122 [INFO][3239] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" iface="eth0" netns="" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.122 [INFO][3239] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.122 [INFO][3239] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.141 [INFO][3246] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.141 [INFO][3246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.141 [INFO][3246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.149 [WARNING][3246] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.149 [INFO][3246] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" HandleID="k8s-pod-network.63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Workload="10.200.4.18-k8s-csi--node--driver--xppb6-eth0" Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.150 [INFO][3246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:01.470010 env[1438]: 2025-09-13 00:56:01.151 [INFO][3239] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0" Sep 13 00:56:01.470010 env[1438]: time="2025-09-13T00:56:01.152674826Z" level=info msg="TearDown network for sandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\" successfully" Sep 13 00:56:01.817462 env[1438]: time="2025-09-13T00:56:01.817359804Z" level=info msg="RemovePodSandbox \"63d255408b54359d4ac5e4c59a18ac9b2112cbb34ab8eeebeadca0623047f6b0\" returns successfully" Sep 13 00:56:01.818353 env[1438]: time="2025-09-13T00:56:01.818325405Z" level=info msg="StopPodSandbox for \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\"" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.848 [WARNING][3260] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"56fc3f08-aebe-47a4-aba7-ad57ee748ed2", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75", Pod:"nginx-deployment-7fcdb87857-cq26l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali080edcb55c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.849 [INFO][3260] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.849 [INFO][3260] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" iface="eth0" netns="" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.849 [INFO][3260] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.849 [INFO][3260] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.867 [INFO][3267] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.867 [INFO][3267] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.867 [INFO][3267] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.878 [WARNING][3267] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.878 [INFO][3267] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.879 [INFO][3267] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:01.881321 env[1438]: 2025-09-13 00:56:01.880 [INFO][3260] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.881869 env[1438]: time="2025-09-13T00:56:01.881352631Z" level=info msg="TearDown network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\" successfully" Sep 13 00:56:01.881869 env[1438]: time="2025-09-13T00:56:01.881387831Z" level=info msg="StopPodSandbox for \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\" returns successfully" Sep 13 00:56:01.882188 env[1438]: time="2025-09-13T00:56:01.882161232Z" level=info msg="RemovePodSandbox for \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\"" Sep 13 00:56:01.882288 env[1438]: time="2025-09-13T00:56:01.882192232Z" level=info msg="Forcibly stopping sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\"" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.913 [WARNING][3283] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"56fc3f08-aebe-47a4-aba7-ad57ee748ed2", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"6fe449365f40561aa0e86ed721d41f6f5ad18795bf008403a82fc1296b562d75", Pod:"nginx-deployment-7fcdb87857-cq26l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali080edcb55c2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.913 [INFO][3283] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.913 [INFO][3283] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" iface="eth0" netns="" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.913 [INFO][3283] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.913 [INFO][3283] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.933 [INFO][3290] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.933 [INFO][3290] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.933 [INFO][3290] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.941 [WARNING][3290] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.941 [INFO][3290] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" HandleID="k8s-pod-network.f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--cq26l-eth0" Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.948 [INFO][3290] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:01.951019 env[1438]: 2025-09-13 00:56:01.949 [INFO][3283] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63" Sep 13 00:56:01.951710 env[1438]: time="2025-09-13T00:56:01.951015060Z" level=info msg="TearDown network for sandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\" successfully" Sep 13 00:56:02.016540 kubelet[1974]: E0913 00:56:02.016512 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:02.068849 env[1438]: time="2025-09-13T00:56:02.067798009Z" level=info msg="RemovePodSandbox \"f3f74218f0c49c0cbdd73125d252a98e9b7b2df675566313f0276ac206460b63\" returns successfully" Sep 13 00:56:03.016630 kubelet[1974]: E0913 00:56:03.016598 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:04.017632 kubelet[1974]: E0913 00:56:04.017600 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:04.468681 env[1438]: time="2025-09-13T00:56:04.468636483Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:04.473935 env[1438]: time="2025-09-13T00:56:04.473901885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:04.477606 env[1438]: time="2025-09-13T00:56:04.477580286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:04.514652 env[1438]: time="2025-09-13T00:56:04.514597901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:04.515359 env[1438]: time="2025-09-13T00:56:04.515328801Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 13 00:56:04.563045 env[1438]: time="2025-09-13T00:56:04.562998220Z" level=info msg="CreateContainer within sandbox \"7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 00:56:04.774656 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2103743454.mount: Deactivated successfully. Sep 13 00:56:04.783982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3278730429.mount: Deactivated successfully. Sep 13 00:56:04.910549 env[1438]: time="2025-09-13T00:56:04.910491558Z" level=info msg="CreateContainer within sandbox \"7616b43af49a17795f93a7a6c987d43fa7c4499bf9579162e5573f2daa5f0c89\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e890c56a890ef8b2bd217e044f4187cf67ddb2d130846296b2d951cae4d9dca9\"" Sep 13 00:56:04.911186 env[1438]: time="2025-09-13T00:56:04.911060359Z" level=info msg="StartContainer for \"e890c56a890ef8b2bd217e044f4187cf67ddb2d130846296b2d951cae4d9dca9\"" Sep 13 00:56:04.930769 systemd[1]: Started cri-containerd-e890c56a890ef8b2bd217e044f4187cf67ddb2d130846296b2d951cae4d9dca9.scope. Sep 13 00:56:04.964555 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 13 00:56:04.964687 kernel: audit: type=1400 audit(1757724964.943:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.979072 kernel: audit: type=1400 audit(1757724964.943:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.979156 kernel: audit: type=1400 audit(1757724964.943:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.993360 kernel: audit: type=1400 audit(1757724964.943:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:05.018562 kubelet[1974]: E0913 00:56:05.018514 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:05.034908 kernel: audit: type=1400 audit(1757724964.943:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:05.034989 kernel: audit: type=1400 audit(1757724964.943:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:05.035017 kernel: audit: type=1400 audit(1757724964.943:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:05.048386 kernel: audit: type=1400 audit(1757724964.943:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:05.099911 kernel: audit: type=1400 audit(1757724964.943:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:05.100039 kernel: audit: type=1400 audit(1757724964.943:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit: BPF prog-id=120 op=LOAD Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3167 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:04.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393063353661383930656638623262643231376530343466343138 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3167 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:04.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393063353661383930656638623262643231376530343466343138 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.943000 audit: BPF prog-id=121 op=LOAD Sep 13 00:56:04.943000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3dc0 items=0 ppid=3167 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:04.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393063353661383930656638623262643231376530343466343138 Sep 13 00:56:05.101703 env[1438]: time="2025-09-13T00:56:05.101664434Z" level=info msg="StartContainer for \"e890c56a890ef8b2bd217e044f4187cf67ddb2d130846296b2d951cae4d9dca9\" returns successfully" Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit: BPF prog-id=122 op=LOAD Sep 13 00:56:04.963000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3e08 items=0 ppid=3167 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:04.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393063353661383930656638623262643231376530343466343138 Sep 13 00:56:04.963000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:56:04.963000 audit: BPF prog-id=121 op=UNLOAD Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:04.963000 audit: BPF prog-id=123 op=LOAD Sep 13 00:56:04.963000 audit[3329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e2218 items=0 ppid=3167 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:04.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393063353661383930656638623262643231376530343466343138 Sep 13 00:56:05.112000 audit[3358]: AVC avc: denied { search } for pid=3358 comm="rpcbind" name="crypto" dev="proc" ino=26791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:56:05.112000 audit[3358]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4aa45d40c0 a2=0 a3=0 items=0 ppid=3340 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 key=(null) Sep 13 00:56:05.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 00:56:05.145000 audit[3363]: AVC avc: denied { search } for pid=3363 comm="dbus-daemon" name="crypto" dev="proc" ino=26791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:56:05.145000 audit[3363]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f749a0700c0 a2=0 a3=0 items=0 ppid=3340 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 key=(null) Sep 13 00:56:05.145000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:56:05.148000 audit[3364]: AVC avc: denied { watch } for pid=3364 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537454 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c467,c821 tclass=dir permissive=0 Sep 13 00:56:05.148000 audit[3364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55a868e5eca0 a2=2c8 a3=7fff2560756c items=0 ppid=3340 pid=3364 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 key=(null) Sep 13 00:56:05.148000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:56:05.152000 audit[3365]: AVC avc: denied { read } for pid=3365 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26383 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 00:56:05.152000 audit[3365]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f1f2341a320 a1=80000 a2=d a3=7ffc98547160 items=0 ppid=3340 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 key=(null) Sep 13 00:56:05.152000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:56:05.153000 audit[3365]: AVC avc: denied { search } for pid=3365 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:56:05.153000 audit[3365]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1f2296e0c0 a2=0 a3=0 items=0 ppid=3340 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c821 key=(null) Sep 13 00:56:05.153000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:56:05.192985 kubelet[1974]: I0913 00:56:05.192939 1974 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.334887517 podStartE2EDuration="14.192921769s" podCreationTimestamp="2025-09-13 00:55:51 +0000 UTC" firstStartedPulling="2025-09-13 00:55:53.65841085 +0000 UTC m=+53.758957226" lastFinishedPulling="2025-09-13 00:56:04.516445002 +0000 UTC m=+64.616991478" observedRunningTime="2025-09-13 00:56:05.192757569 +0000 UTC m=+65.293304045" watchObservedRunningTime="2025-09-13 00:56:05.192921769 +0000 UTC m=+65.293468245" Sep 13 00:56:05.209000 audit[3370]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:05.209000 audit[3370]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff66e144a0 a2=0 a3=7fff66e1448c items=0 ppid=2187 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:05.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:05.215000 audit[3370]: NETFILTER_CFG table=nat:79 family=2 entries=110 op=nft_register_chain pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:56:05.215000 audit[3370]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fff66e144a0 a2=0 a3=7fff66e1448c items=0 ppid=2187 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:05.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:56:06.019277 kubelet[1974]: E0913 00:56:06.019242 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:07.020039 kubelet[1974]: E0913 00:56:07.020003 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:08.020721 kubelet[1974]: E0913 00:56:08.020683 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:09.021405 kubelet[1974]: E0913 00:56:09.021373 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:10.022421 kubelet[1974]: E0913 00:56:10.022379 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:11.022622 kubelet[1974]: E0913 00:56:11.022588 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:12.023327 kubelet[1974]: E0913 00:56:12.023291 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:13.024178 kubelet[1974]: E0913 00:56:13.024142 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:14.025139 kubelet[1974]: E0913 00:56:14.025098 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:15.025583 kubelet[1974]: E0913 00:56:15.025551 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:16.025903 kubelet[1974]: E0913 00:56:16.025871 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:17.026005 kubelet[1974]: E0913 00:56:17.025965 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:18.027061 kubelet[1974]: E0913 00:56:18.027028 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:19.027195 kubelet[1974]: E0913 00:56:19.027158 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:20.027522 kubelet[1974]: E0913 00:56:20.027489 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:20.974831 kubelet[1974]: E0913 00:56:20.974799 1974 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:21.028139 kubelet[1974]: E0913 00:56:21.028111 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:22.028817 kubelet[1974]: E0913 00:56:22.028781 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:23.029192 kubelet[1974]: E0913 00:56:23.029158 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:24.029902 kubelet[1974]: E0913 00:56:24.029862 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:25.030343 kubelet[1974]: E0913 00:56:25.030311 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:25.331574 systemd[1]: Created slice kubepods-besteffort-pod153e5d44_8d6b_4e98_b526_c1e6c50e859b.slice. Sep 13 00:56:25.393027 kubelet[1974]: I0913 00:56:25.392991 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t2n8j\" (UniqueName: \"kubernetes.io/projected/153e5d44-8d6b-4e98-b526-c1e6c50e859b-kube-api-access-t2n8j\") pod \"test-pod-1\" (UID: \"153e5d44-8d6b-4e98-b526-c1e6c50e859b\") " pod="default/test-pod-1" Sep 13 00:56:25.393200 kubelet[1974]: I0913 00:56:25.393051 1974 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0e56cd10-8030-437f-9400-29cb8ce4f26c\" (UniqueName: \"kubernetes.io/nfs/153e5d44-8d6b-4e98-b526-c1e6c50e859b-pvc-0e56cd10-8030-437f-9400-29cb8ce4f26c\") pod \"test-pod-1\" (UID: \"153e5d44-8d6b-4e98-b526-c1e6c50e859b\") " pod="default/test-pod-1" Sep 13 00:56:25.690388 kernel: Failed to create system directory netfs Sep 13 00:56:25.690534 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 00:56:25.690560 kernel: audit: type=1400 audit(1757724985.683:753): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.683000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.712518 kernel: Failed to create system directory netfs Sep 13 00:56:25.712600 kernel: audit: type=1400 audit(1757724985.683:753): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.683000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.734626 kernel: Failed to create system directory netfs Sep 13 00:56:25.734746 kernel: audit: type=1400 audit(1757724985.683:753): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.683000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.777400 kernel: Failed to create system directory netfs Sep 13 00:56:25.777492 kernel: audit: type=1400 audit(1757724985.683:753): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.683000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.683000 audit[3397]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556115dab5e0 a1=153bc a2=5560ec3e42b0 a3=5 items=0 ppid=55 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.683000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:56:25.806128 kernel: audit: type=1300 audit(1757724985.683:753): arch=c000003e syscall=175 success=yes exit=0 a0=556115dab5e0 a1=153bc a2=5560ec3e42b0 a3=5 items=0 ppid=55 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.806215 kernel: audit: type=1327 audit(1757724985.683:753): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.842278 kernel: Failed to create system directory fscache Sep 13 00:56:25.842346 kernel: audit: type=1400 audit(1757724985.812:754): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.842375 kernel: Failed to create system directory fscache Sep 13 00:56:25.842395 kernel: audit: type=1400 audit(1757724985.812:754): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.863829 kernel: Failed to create system directory fscache Sep 13 00:56:25.863885 kernel: audit: type=1400 audit(1757724985.812:754): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.885690 kernel: Failed to create system directory fscache Sep 13 00:56:25.885747 kernel: audit: type=1400 audit(1757724985.812:754): avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.903228 kernel: Failed to create system directory fscache Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.910473 kernel: Failed to create system directory fscache Sep 13 00:56:25.910524 kernel: Failed to create system directory fscache Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.918143 kernel: Failed to create system directory fscache Sep 13 00:56:25.918191 kernel: Failed to create system directory fscache Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.925565 kernel: Failed to create system directory fscache Sep 13 00:56:25.925629 kernel: Failed to create system directory fscache Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.933217 kernel: Failed to create system directory fscache Sep 13 00:56:25.933263 kernel: Failed to create system directory fscache Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.812000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:25.940328 kernel: Failed to create system directory fscache Sep 13 00:56:25.944345 kernel: FS-Cache: Loaded Sep 13 00:56:25.812000 audit[3397]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556115fc09c0 a1=4c0fc a2=5560ec3e42b0 a3=5 items=0 ppid=55 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:25.812000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.030952 kubelet[1974]: E0913 00:56:26.030923 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:26.032447 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.032517 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.032546 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.039353 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.039440 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.046233 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.049857 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.049915 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.057548 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.057611 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.064819 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.064907 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.071763 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.071839 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.078353 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.079226 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.082218 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.088317 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.088386 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.094536 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.094598 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.100593 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.100676 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.106751 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.106809 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.112665 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.112725 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.119776 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.119839 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.126551 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.126606 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.132790 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.132846 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.138471 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.138531 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.144001 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.144066 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.149712 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.149778 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.155104 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.155140 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.160526 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.163132 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.163243 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.168696 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.168738 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.174079 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.174131 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.179297 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.179343 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.184573 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.185225 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.188220 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.192786 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.192826 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.197558 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.200981 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.201020 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.206273 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.206334 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.211740 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.211784 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.217390 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.217455 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.222707 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.222743 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.225229 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.230730 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.230786 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.236084 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.236121 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.239332 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.244171 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.249676 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.249735 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.249755 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.255021 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.255064 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.260416 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.260472 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.265767 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.265805 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.271054 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.274039 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.276755 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.276793 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.280234 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.284980 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.285028 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.290362 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.291233 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.296109 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.296149 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.301373 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.301455 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.303928 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.309566 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.309642 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.315003 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.315047 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.320295 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.320334 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.323223 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.328284 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.328322 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.333531 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.333568 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.336223 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.341711 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.342272 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.347558 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.350231 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.350270 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.355660 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.355704 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.360967 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.360999 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.366610 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.366657 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.372135 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.372176 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.377307 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.377349 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.380222 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.384620 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.013000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.387061 kernel: Failed to create system directory sunrpc Sep 13 00:56:26.399914 kernel: RPC: Registered named UNIX socket transport module. Sep 13 00:56:26.399990 kernel: RPC: Registered udp transport module. Sep 13 00:56:26.400034 kernel: RPC: Registered tcp transport module. Sep 13 00:56:26.405593 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 00:56:26.013000 audit[3397]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55611600cad0 a1=1a8274 a2=5560ec3e42b0 a3=5 items=6 ppid=55 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:26.013000 audit: CWD cwd="/" Sep 13 00:56:26.013000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:26.013000 audit: PATH item=1 name=(null) inode=26575 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:26.013000 audit: PATH item=2 name=(null) inode=26575 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:26.013000 audit: PATH item=3 name=(null) inode=26576 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:26.013000 audit: PATH item=4 name=(null) inode=26575 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:26.013000 audit: PATH item=5 name=(null) inode=26577 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:56:26.013000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.634808 kernel: Failed to create system directory nfs Sep 13 00:56:26.634901 kernel: Failed to create system directory nfs Sep 13 00:56:26.634928 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.640243 kernel: Failed to create system directory nfs Sep 13 00:56:26.640300 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.645421 kernel: Failed to create system directory nfs Sep 13 00:56:26.645465 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.650490 kernel: Failed to create system directory nfs Sep 13 00:56:26.650528 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.655821 kernel: Failed to create system directory nfs Sep 13 00:56:26.655858 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.660947 kernel: Failed to create system directory nfs Sep 13 00:56:26.661002 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.664221 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.668919 kernel: Failed to create system directory nfs Sep 13 00:56:26.668961 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.674108 kernel: Failed to create system directory nfs Sep 13 00:56:26.674149 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.679272 kernel: Failed to create system directory nfs Sep 13 00:56:26.679320 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.681801 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.687190 kernel: Failed to create system directory nfs Sep 13 00:56:26.687250 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.692334 kernel: Failed to create system directory nfs Sep 13 00:56:26.692368 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.694887 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.697375 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.703184 kernel: Failed to create system directory nfs Sep 13 00:56:26.703227 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.706225 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.711634 kernel: Failed to create system directory nfs Sep 13 00:56:26.711687 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.716882 kernel: Failed to create system directory nfs Sep 13 00:56:26.716924 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.720268 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.724737 kernel: Failed to create system directory nfs Sep 13 00:56:26.724781 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.729865 kernel: Failed to create system directory nfs Sep 13 00:56:26.729900 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.735409 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.738106 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.740796 kernel: Failed to create system directory nfs Sep 13 00:56:26.741412 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.746002 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.746228 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.751519 kernel: Failed to create system directory nfs Sep 13 00:56:26.751562 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.754034 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.756554 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.762027 kernel: Failed to create system directory nfs Sep 13 00:56:26.762075 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.767349 kernel: Failed to create system directory nfs Sep 13 00:56:26.767406 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.772528 kernel: Failed to create system directory nfs Sep 13 00:56:26.772580 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.775073 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.777596 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.779976 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.782220 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.620000 audit[3397]: AVC avc: denied { confidentiality } for pid=3397 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.786946 kernel: Failed to create system directory nfs Sep 13 00:56:26.620000 audit[3397]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55611622dc10 a1=16eb2c a2=5560ec3e42b0 a3=5 items=0 ppid=55 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:26.806389 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 00:56:26.620000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.893194 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.893344 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.896387 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.896434 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.899271 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.904782 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.904823 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.908227 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.912746 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.913244 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.918087 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.918150 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.923302 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.923339 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.928511 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.928576 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.931060 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.933753 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.936366 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.939488 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.944295 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.945248 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.947227 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.952500 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.952546 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.957739 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.957780 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.962908 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.962945 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.966260 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.971275 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.971307 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.976490 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.976529 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.979100 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.981947 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.984548 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.987333 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.990076 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.995466 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.995524 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.998159 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.000829 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.005971 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.006025 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.009229 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.014034 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.016615 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.019460 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.022327 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.022357 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.025247 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.030199 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.030261 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.032371 kubelet[1974]: E0913 00:56:27.032319 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:27.032853 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.035399 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.038032 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.040627 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.044224 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.051605 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.051654 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.051675 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.056773 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.056818 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.063414 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.063483 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.073179 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.073244 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.073278 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.080702 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.080769 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.086662 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.086727 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.093060 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.093106 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.097257 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.103176 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.103230 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.106258 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.109364 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.115098 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.115142 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.117743 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.120403 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.123277 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.125755 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.127983 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.130514 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.135506 kernel: Failed to create system directory nfs4 Sep 13 00:56:27.135551 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.138035 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.140670 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.143290 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.147107 kernel: Failed to create system directory nfs4 Sep 13 00:56:26.875000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.265451 kernel: NFS: Registering the id_resolver key type Sep 13 00:56:27.265577 kernel: Key type id_resolver registered Sep 13 00:56:27.265605 kernel: Key type id_legacy registered Sep 13 00:56:26.875000 audit[3402]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4487cef010 a1=2095c4 a2=561f958dc2b0 a3=5 items=0 ppid=55 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:26.875000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.339301 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.339368 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.344699 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.344739 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.350162 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.350197 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.355514 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.355556 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.360901 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.360945 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.366230 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.366261 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.371548 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.371599 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.379939 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.379987 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.380684 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.385342 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.385378 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.388449 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.393474 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.393527 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.397255 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.401743 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.401792 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.332000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:56:27.407296 kernel: Failed to create system directory rpcgss Sep 13 00:56:27.332000 audit[3403]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa9f5d43010 a1=70bf4 a2=564defaa82b0 a3=5 items=0 ppid=55 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.332000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 00:56:27.661356 nfsidmap[3412]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-99b5c97c7e' Sep 13 00:56:27.668558 nfsidmap[3414]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-99b5c97c7e' Sep 13 00:56:27.679000 audit[1550]: AVC avc: denied { watch_reads } for pid=1550 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:56:27.679000 audit[1550]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e9365591c0 a2=10 a3=3cf982ff2e2c6dc9 items=0 ppid=1 pid=1550 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.679000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:56:27.679000 audit[1550]: AVC avc: denied { watch_reads } for pid=1550 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:56:27.679000 audit[1550]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e9365591c0 a2=10 a3=3cf982ff2e2c6dc9 items=0 ppid=1 pid=1550 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.679000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:56:27.679000 audit[1550]: AVC avc: denied { watch_reads } for pid=1550 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:56:27.679000 audit[1550]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e9365591c0 a2=10 a3=3cf982ff2e2c6dc9 items=0 ppid=1 pid=1550 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.679000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:56:27.680000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:56:27.680000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:56:27.680000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2800 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:56:27.735019 env[1438]: time="2025-09-13T00:56:27.734972728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:153e5d44-8d6b-4e98-b526-c1e6c50e859b,Namespace:default,Attempt:0,}" Sep 13 00:56:27.863023 systemd-networkd[1604]: cali5ec59c6bf6e: Link UP Sep 13 00:56:27.871342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:56:27.871420 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 00:56:27.871971 systemd-networkd[1604]: cali5ec59c6bf6e: Gained carrier Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.799 [INFO][3415] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-test--pod--1-eth0 default 153e5d44-8d6b-4e98-b526-c1e6c50e859b 1676 0 2025-09-13 00:55:52 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.18 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.799 [INFO][3415] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.822 [INFO][3428] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" HandleID="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Workload="10.200.4.18-k8s-test--pod--1-eth0" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.822 [INFO][3428] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" HandleID="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Workload="10.200.4.18-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"test-pod-1", "timestamp":"2025-09-13 00:56:27.822538654 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.822 [INFO][3428] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.822 [INFO][3428] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.822 [INFO][3428] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.829 [INFO][3428] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.833 [INFO][3428] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.836 [INFO][3428] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.837 [INFO][3428] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.839 [INFO][3428] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.839 [INFO][3428] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.840 [INFO][3428] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721 Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.851 [INFO][3428] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.859 [INFO][3428] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.68/26] block=192.168.76.64/26 handle="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.859 [INFO][3428] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.68/26] handle="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" host="10.200.4.18" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.859 [INFO][3428] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.859 [INFO][3428] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.68/26] IPv6=[] ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" HandleID="k8s-pod-network.7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Workload="10.200.4.18-k8s-test--pod--1-eth0" Sep 13 00:56:27.885166 env[1438]: 2025-09-13 00:56:27.860 [INFO][3415] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"153e5d44-8d6b-4e98-b526-c1e6c50e859b", ResourceVersion:"1676", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:27.886457 env[1438]: 2025-09-13 00:56:27.860 [INFO][3415] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.68/32] ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Sep 13 00:56:27.886457 env[1438]: 2025-09-13 00:56:27.860 [INFO][3415] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Sep 13 00:56:27.886457 env[1438]: 2025-09-13 00:56:27.875 [INFO][3415] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Sep 13 00:56:27.886457 env[1438]: 2025-09-13 00:56:27.875 [INFO][3415] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"153e5d44-8d6b-4e98-b526-c1e6c50e859b", ResourceVersion:"1676", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 55, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ea:0b:db:54:22:f6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:56:27.886457 env[1438]: 2025-09-13 00:56:27.883 [INFO][3415] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Sep 13 00:56:27.899000 audit[3448]: NETFILTER_CFG table=filter:80 family=2 entries=40 op=nft_register_chain pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:56:27.899000 audit[3448]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffedf287ad0 a2=0 a3=7ffedf287abc items=0 ppid=2569 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.899000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:56:27.901451 env[1438]: time="2025-09-13T00:56:27.901390177Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:56:27.901556 env[1438]: time="2025-09-13T00:56:27.901466977Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:56:27.901556 env[1438]: time="2025-09-13T00:56:27.901496177Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:56:27.901904 env[1438]: time="2025-09-13T00:56:27.901848477Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721 pid=3453 runtime=io.containerd.runc.v2 Sep 13 00:56:27.919150 systemd[1]: Started cri-containerd-7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721.scope. Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.933000 audit: BPF prog-id=124 op=LOAD Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3453 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763376130646137643563643763616331313936373666306564326562 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3453 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763376130646137643563643763616331313936373666306564326562 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit: BPF prog-id=125 op=LOAD Sep 13 00:56:27.934000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002edd90 items=0 ppid=3453 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763376130646137643563643763616331313936373666306564326562 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit: BPF prog-id=126 op=LOAD Sep 13 00:56:27.934000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002eddd8 items=0 ppid=3453 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763376130646137643563643763616331313936373666306564326562 Sep 13 00:56:27.934000 audit: BPF prog-id=126 op=UNLOAD Sep 13 00:56:27.934000 audit: BPF prog-id=125 op=UNLOAD Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:27.934000 audit: BPF prog-id=127 op=LOAD Sep 13 00:56:27.934000 audit[3462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003641e8 items=0 ppid=3453 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:27.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763376130646137643563643763616331313936373666306564326562 Sep 13 00:56:27.961150 env[1438]: time="2025-09-13T00:56:27.961100994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:153e5d44-8d6b-4e98-b526-c1e6c50e859b,Namespace:default,Attempt:0,} returns sandbox id \"7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721\"" Sep 13 00:56:27.962746 env[1438]: time="2025-09-13T00:56:27.962714894Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:56:28.032454 kubelet[1974]: E0913 00:56:28.032419 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:28.269412 env[1438]: time="2025-09-13T00:56:28.269317983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.274506 env[1438]: time="2025-09-13T00:56:28.274477484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.277786 env[1438]: time="2025-09-13T00:56:28.277762385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.281736 env[1438]: time="2025-09-13T00:56:28.281707286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:56:28.282355 env[1438]: time="2025-09-13T00:56:28.282324786Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:56:28.291851 env[1438]: time="2025-09-13T00:56:28.291817089Z" level=info msg="CreateContainer within sandbox \"7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 00:56:28.321901 env[1438]: time="2025-09-13T00:56:28.321868698Z" level=info msg="CreateContainer within sandbox \"7c7a0da7d5cd7cac119676f0ed2eb3cec6c99df5f1268dcbb93e6e4420e94721\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"a3ddfbd1f0fed9bedde87df49d632f82fd30b56e8de9bd680d1fc469204c697a\"" Sep 13 00:56:28.322382 env[1438]: time="2025-09-13T00:56:28.322359498Z" level=info msg="StartContainer for \"a3ddfbd1f0fed9bedde87df49d632f82fd30b56e8de9bd680d1fc469204c697a\"" Sep 13 00:56:28.341186 systemd[1]: Started cri-containerd-a3ddfbd1f0fed9bedde87df49d632f82fd30b56e8de9bd680d1fc469204c697a.scope. Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit: BPF prog-id=128 op=LOAD Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3453 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646466626431663066656439626564646538376466343964363332 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3453 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646466626431663066656439626564646538376466343964363332 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit: BPF prog-id=129 op=LOAD Sep 13 00:56:28.353000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000277dc0 items=0 ppid=3453 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646466626431663066656439626564646538376466343964363332 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.353000 audit: BPF prog-id=130 op=LOAD Sep 13 00:56:28.353000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000277e08 items=0 ppid=3453 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646466626431663066656439626564646538376466343964363332 Sep 13 00:56:28.354000 audit: BPF prog-id=130 op=UNLOAD Sep 13 00:56:28.354000 audit: BPF prog-id=129 op=UNLOAD Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:56:28.354000 audit: BPF prog-id=131 op=LOAD Sep 13 00:56:28.354000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d4218 items=0 ppid=3453 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:56:28.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646466626431663066656439626564646538376466343964363332 Sep 13 00:56:28.377922 env[1438]: time="2025-09-13T00:56:28.377884714Z" level=info msg="StartContainer for \"a3ddfbd1f0fed9bedde87df49d632f82fd30b56e8de9bd680d1fc469204c697a\" returns successfully" Sep 13 00:56:29.032951 kubelet[1974]: E0913 00:56:29.032907 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:29.138370 systemd-networkd[1604]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 00:56:29.232427 kubelet[1974]: I0913 00:56:29.232376 1974 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=36.911080666 podStartE2EDuration="37.232364059s" podCreationTimestamp="2025-09-13 00:55:52 +0000 UTC" firstStartedPulling="2025-09-13 00:56:27.962059094 +0000 UTC m=+88.062605470" lastFinishedPulling="2025-09-13 00:56:28.283342487 +0000 UTC m=+88.383888863" observedRunningTime="2025-09-13 00:56:29.231912659 +0000 UTC m=+89.332459135" watchObservedRunningTime="2025-09-13 00:56:29.232364059 +0000 UTC m=+89.332910435" Sep 13 00:56:30.033560 kubelet[1974]: E0913 00:56:30.033514 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:31.034120 kubelet[1974]: E0913 00:56:31.034084 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:31.952376 systemd[1]: run-containerd-runc-k8s.io-446bb40ff710aaaa1f27573d1792133b4924c6919cf10c258209b58d77aebe89-runc.SmkbLk.mount: Deactivated successfully. Sep 13 00:56:32.034796 kubelet[1974]: E0913 00:56:32.034767 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:33.035189 kubelet[1974]: E0913 00:56:33.035150 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:34.036229 kubelet[1974]: E0913 00:56:34.036187 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:35.036709 kubelet[1974]: E0913 00:56:35.036673 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:36.037602 kubelet[1974]: E0913 00:56:36.037572 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:37.038365 kubelet[1974]: E0913 00:56:37.038326 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:56:38.039218 kubelet[1974]: E0913 00:56:38.039165 1974 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"