Sep 13 00:45:49.106965 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:45:49.107004 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:45:49.107021 kernel: BIOS-provided physical RAM map: Sep 13 00:45:49.107034 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Sep 13 00:45:49.107046 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Sep 13 00:45:49.107059 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Sep 13 00:45:49.107080 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Sep 13 00:45:49.107094 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Sep 13 00:45:49.107108 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd27afff] usable Sep 13 00:45:49.107121 kernel: BIOS-e820: [mem 0x00000000bd27b000-0x00000000bd284fff] ACPI data Sep 13 00:45:49.107136 kernel: BIOS-e820: [mem 0x00000000bd285000-0x00000000bf8ecfff] usable Sep 13 00:45:49.107150 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Sep 13 00:45:49.107164 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Sep 13 00:45:49.107178 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Sep 13 00:45:49.107199 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Sep 13 00:45:49.107214 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Sep 13 00:45:49.107229 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Sep 13 00:45:49.107244 kernel: NX (Execute Disable) protection: active Sep 13 00:45:49.107260 kernel: efi: EFI v2.70 by EDK II Sep 13 00:45:49.107275 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd27b018 Sep 13 00:45:49.107290 kernel: random: crng init done Sep 13 00:45:49.107306 kernel: SMBIOS 2.4 present. Sep 13 00:45:49.107325 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 Sep 13 00:45:49.107340 kernel: Hypervisor detected: KVM Sep 13 00:45:49.107355 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 13 00:45:49.107370 kernel: kvm-clock: cpu 0, msr 13019f001, primary cpu clock Sep 13 00:45:49.107385 kernel: kvm-clock: using sched offset of 13335760403 cycles Sep 13 00:45:49.107399 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 13 00:45:49.107414 kernel: tsc: Detected 2299.998 MHz processor Sep 13 00:45:49.107430 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:45:49.107446 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:45:49.107462 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Sep 13 00:45:49.107482 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:45:49.107498 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Sep 13 00:45:49.107513 kernel: Using GB pages for direct mapping Sep 13 00:45:49.107528 kernel: Secure boot disabled Sep 13 00:45:49.107544 kernel: ACPI: Early table checksum verification disabled Sep 13 00:45:49.107574 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Sep 13 00:45:49.107590 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Sep 13 00:45:49.107605 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Sep 13 00:45:49.107631 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Sep 13 00:45:49.107648 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Sep 13 00:45:49.107678 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20250404) Sep 13 00:45:49.107694 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Sep 13 00:45:49.107712 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Sep 13 00:45:49.107728 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Sep 13 00:45:49.107749 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Sep 13 00:45:49.107766 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Sep 13 00:45:49.107781 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Sep 13 00:45:49.107796 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Sep 13 00:45:49.107811 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Sep 13 00:45:49.107828 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Sep 13 00:45:49.107845 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Sep 13 00:45:49.107861 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Sep 13 00:45:49.107877 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Sep 13 00:45:49.107898 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Sep 13 00:45:49.107915 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Sep 13 00:45:49.107932 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:45:49.107948 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:45:49.107965 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 13 00:45:49.107980 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Sep 13 00:45:49.107996 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Sep 13 00:45:49.108014 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Sep 13 00:45:49.108031 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Sep 13 00:45:49.108052 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Sep 13 00:45:49.108069 kernel: Zone ranges: Sep 13 00:45:49.108086 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:45:49.108103 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 13 00:45:49.108120 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Sep 13 00:45:49.108137 kernel: Movable zone start for each node Sep 13 00:45:49.108153 kernel: Early memory node ranges Sep 13 00:45:49.108170 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Sep 13 00:45:49.108187 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Sep 13 00:45:49.108208 kernel: node 0: [mem 0x0000000000100000-0x00000000bd27afff] Sep 13 00:45:49.108223 kernel: node 0: [mem 0x00000000bd285000-0x00000000bf8ecfff] Sep 13 00:45:49.108238 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Sep 13 00:45:49.108254 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Sep 13 00:45:49.108270 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Sep 13 00:45:49.108286 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:45:49.108302 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Sep 13 00:45:49.108319 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Sep 13 00:45:49.108335 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Sep 13 00:45:49.108356 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Sep 13 00:45:49.108373 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Sep 13 00:45:49.108389 kernel: ACPI: PM-Timer IO Port: 0xb008 Sep 13 00:45:49.108406 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 13 00:45:49.108423 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:45:49.108440 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 13 00:45:49.108456 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:45:49.108473 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 13 00:45:49.108489 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 13 00:45:49.108511 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:45:49.108528 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:45:49.108545 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Sep 13 00:45:49.108571 kernel: Booting paravirtualized kernel on KVM Sep 13 00:45:49.108588 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:45:49.108605 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:45:49.108622 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:45:49.108639 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:45:49.108668 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:45:49.108690 kernel: kvm-guest: PV spinlocks enabled Sep 13 00:45:49.108706 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 13 00:45:49.108723 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Sep 13 00:45:49.108739 kernel: Policy zone: Normal Sep 13 00:45:49.108758 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:45:49.108775 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:45:49.108792 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 13 00:45:49.108808 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:45:49.108825 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:45:49.108846 kernel: Memory: 7515424K/7860544K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 344860K reserved, 0K cma-reserved) Sep 13 00:45:49.108863 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:45:49.108880 kernel: Kernel/User page tables isolation: enabled Sep 13 00:45:49.108897 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:45:49.108914 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:45:49.108931 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:45:49.108949 kernel: rcu: RCU event tracing is enabled. Sep 13 00:45:49.108966 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:45:49.108987 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:45:49.109017 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:45:49.109035 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:45:49.109056 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:45:49.109074 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Sep 13 00:45:49.109092 kernel: Console: colour dummy device 80x25 Sep 13 00:45:49.109110 kernel: printk: console [ttyS0] enabled Sep 13 00:45:49.109127 kernel: ACPI: Core revision 20210730 Sep 13 00:45:49.109145 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:45:49.109163 kernel: x2apic enabled Sep 13 00:45:49.109184 kernel: Switched APIC routing to physical x2apic. Sep 13 00:45:49.109202 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Sep 13 00:45:49.109219 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Sep 13 00:45:49.109237 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Sep 13 00:45:49.109256 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Sep 13 00:45:49.109273 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Sep 13 00:45:49.109291 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:45:49.109313 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 13 00:45:49.109331 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 13 00:45:49.109349 kernel: Spectre V2 : Mitigation: IBRS Sep 13 00:45:49.109367 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:45:49.109384 kernel: RETBleed: Mitigation: IBRS Sep 13 00:45:49.109402 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 13 00:45:49.109420 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Sep 13 00:45:49.109438 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 13 00:45:49.109456 kernel: MDS: Mitigation: Clear CPU buffers Sep 13 00:45:49.109477 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:45:49.109494 kernel: active return thunk: its_return_thunk Sep 13 00:45:49.109511 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:45:49.109529 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:45:49.109546 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:45:49.109576 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:45:49.109594 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:45:49.109612 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Sep 13 00:45:49.109630 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:45:49.109672 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:45:49.109691 kernel: LSM: Security Framework initializing Sep 13 00:45:49.109707 kernel: SELinux: Initializing. Sep 13 00:45:49.109725 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:45:49.109742 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:45:49.109760 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Sep 13 00:45:49.109778 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Sep 13 00:45:49.109796 kernel: signal: max sigframe size: 1776 Sep 13 00:45:49.109813 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:45:49.109836 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:45:49.109853 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:45:49.109871 kernel: x86: Booting SMP configuration: Sep 13 00:45:49.109889 kernel: .... node #0, CPUs: #1 Sep 13 00:45:49.109907 kernel: kvm-clock: cpu 1, msr 13019f041, secondary cpu clock Sep 13 00:45:49.109924 kernel: Transient Scheduler Attacks: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Sep 13 00:45:49.109944 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 13 00:45:49.109961 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:45:49.109983 kernel: smpboot: Max logical packages: 1 Sep 13 00:45:49.110001 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Sep 13 00:45:49.110018 kernel: devtmpfs: initialized Sep 13 00:45:49.110036 kernel: x86/mm: Memory block size: 128MB Sep 13 00:45:49.110054 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Sep 13 00:45:49.110072 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:45:49.110090 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:45:49.110107 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:45:49.110125 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:45:49.110146 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:45:49.110164 kernel: audit: type=2000 audit(1757724347.458:1): state=initialized audit_enabled=0 res=1 Sep 13 00:45:49.110182 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:45:49.110200 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:45:49.110218 kernel: cpuidle: using governor menu Sep 13 00:45:49.110236 kernel: ACPI: bus type PCI registered Sep 13 00:45:49.110253 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:45:49.110271 kernel: dca service started, version 1.12.1 Sep 13 00:45:49.110289 kernel: PCI: Using configuration type 1 for base access Sep 13 00:45:49.110311 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:45:49.110329 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:45:49.110347 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:45:49.110364 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:45:49.110382 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:45:49.110399 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:45:49.110418 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:45:49.110435 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:45:49.110453 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:45:49.110475 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Sep 13 00:45:49.110493 kernel: ACPI: Interpreter enabled Sep 13 00:45:49.110509 kernel: ACPI: PM: (supports S0 S3 S5) Sep 13 00:45:49.110525 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:45:49.110543 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:45:49.110571 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Sep 13 00:45:49.110589 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 13 00:45:49.110877 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Sep 13 00:45:49.111058 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Sep 13 00:45:49.111081 kernel: PCI host bridge to bus 0000:00 Sep 13 00:45:49.111240 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 13 00:45:49.111390 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 13 00:45:49.111535 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 13 00:45:49.111730 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Sep 13 00:45:49.111886 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 13 00:45:49.112077 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Sep 13 00:45:49.112265 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Sep 13 00:45:49.112447 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Sep 13 00:45:49.112628 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Sep 13 00:45:49.112834 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Sep 13 00:45:49.113013 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Sep 13 00:45:49.113194 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Sep 13 00:45:49.113369 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Sep 13 00:45:49.113535 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Sep 13 00:45:49.113727 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Sep 13 00:45:49.113902 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Sep 13 00:45:49.114076 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Sep 13 00:45:49.114249 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Sep 13 00:45:49.114277 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 13 00:45:49.114296 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 13 00:45:49.114314 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 13 00:45:49.114332 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 13 00:45:49.114350 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Sep 13 00:45:49.114368 kernel: iommu: Default domain type: Translated Sep 13 00:45:49.114386 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:45:49.114404 kernel: vgaarb: loaded Sep 13 00:45:49.114422 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:45:49.114444 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:45:49.114463 kernel: PTP clock support registered Sep 13 00:45:49.114480 kernel: Registered efivars operations Sep 13 00:45:49.114497 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:45:49.114515 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 13 00:45:49.114533 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Sep 13 00:45:49.114550 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Sep 13 00:45:49.114576 kernel: e820: reserve RAM buffer [mem 0xbd27b000-0xbfffffff] Sep 13 00:45:49.114594 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Sep 13 00:45:49.114615 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Sep 13 00:45:49.114632 kernel: clocksource: Switched to clocksource kvm-clock Sep 13 00:45:49.114650 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:45:49.114689 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:45:49.114706 kernel: pnp: PnP ACPI init Sep 13 00:45:49.114724 kernel: pnp: PnP ACPI: found 7 devices Sep 13 00:45:49.114742 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:45:49.114759 kernel: NET: Registered PF_INET protocol family Sep 13 00:45:49.114776 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:45:49.114798 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 13 00:45:49.114815 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:45:49.114833 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:45:49.114850 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 13 00:45:49.114868 kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 13 00:45:49.114885 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:45:49.114903 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 13 00:45:49.114921 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:45:49.114942 kernel: NET: Registered PF_XDP protocol family Sep 13 00:45:49.115115 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 13 00:45:49.115271 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 13 00:45:49.115424 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 13 00:45:49.115585 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Sep 13 00:45:49.115778 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Sep 13 00:45:49.115803 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:45:49.115826 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 13 00:45:49.115845 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Sep 13 00:45:49.115863 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:45:49.115880 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Sep 13 00:45:49.115898 kernel: clocksource: Switched to clocksource tsc Sep 13 00:45:49.115916 kernel: Initialise system trusted keyrings Sep 13 00:45:49.115933 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Sep 13 00:45:49.115951 kernel: Key type asymmetric registered Sep 13 00:45:49.115968 kernel: Asymmetric key parser 'x509' registered Sep 13 00:45:49.115988 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:45:49.116006 kernel: io scheduler mq-deadline registered Sep 13 00:45:49.116023 kernel: io scheduler kyber registered Sep 13 00:45:49.116040 kernel: io scheduler bfq registered Sep 13 00:45:49.116058 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:45:49.116076 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Sep 13 00:45:49.116253 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Sep 13 00:45:49.116276 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Sep 13 00:45:49.116446 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Sep 13 00:45:49.116473 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Sep 13 00:45:49.116733 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Sep 13 00:45:49.116755 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:45:49.116772 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:45:49.116786 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 13 00:45:49.116802 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Sep 13 00:45:49.116818 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Sep 13 00:45:49.117002 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Sep 13 00:45:49.117031 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 13 00:45:49.117048 kernel: i8042: Warning: Keylock active Sep 13 00:45:49.117065 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 13 00:45:49.117082 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 13 00:45:49.129715 kernel: rtc_cmos 00:00: RTC can wake from S4 Sep 13 00:45:49.129928 kernel: rtc_cmos 00:00: registered as rtc0 Sep 13 00:45:49.130102 kernel: rtc_cmos 00:00: setting system clock to 2025-09-13T00:45:48 UTC (1757724348) Sep 13 00:45:49.130274 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Sep 13 00:45:49.130306 kernel: intel_pstate: CPU model not supported Sep 13 00:45:49.130325 kernel: pstore: Registered efi as persistent store backend Sep 13 00:45:49.130344 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:45:49.130362 kernel: Segment Routing with IPv6 Sep 13 00:45:49.130379 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:45:49.130397 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:45:49.130415 kernel: Key type dns_resolver registered Sep 13 00:45:49.130433 kernel: IPI shorthand broadcast: enabled Sep 13 00:45:49.130452 kernel: sched_clock: Marking stable (756017907, 148060603)->(923394058, -19315548) Sep 13 00:45:49.130474 kernel: registered taskstats version 1 Sep 13 00:45:49.130492 kernel: Loading compiled-in X.509 certificates Sep 13 00:45:49.130509 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 13 00:45:49.130528 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:45:49.130546 kernel: Key type .fscrypt registered Sep 13 00:45:49.130563 kernel: Key type fscrypt-provisioning registered Sep 13 00:45:49.130581 kernel: pstore: Using crash dump compression: deflate Sep 13 00:45:49.130599 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:45:49.130617 kernel: ima: No architecture policies found Sep 13 00:45:49.130639 kernel: clk: Disabling unused clocks Sep 13 00:45:49.130672 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:45:49.130690 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:45:49.130708 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:45:49.130727 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:45:49.130744 kernel: Run /init as init process Sep 13 00:45:49.130763 kernel: with arguments: Sep 13 00:45:49.130780 kernel: /init Sep 13 00:45:49.130798 kernel: with environment: Sep 13 00:45:49.130826 kernel: HOME=/ Sep 13 00:45:49.130844 kernel: TERM=linux Sep 13 00:45:49.130862 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:45:49.130884 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:45:49.130906 systemd[1]: Detected virtualization kvm. Sep 13 00:45:49.130926 systemd[1]: Detected architecture x86-64. Sep 13 00:45:49.130943 systemd[1]: Running in initrd. Sep 13 00:45:49.130965 systemd[1]: No hostname configured, using default hostname. Sep 13 00:45:49.130983 systemd[1]: Hostname set to . Sep 13 00:45:49.131003 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:45:49.131021 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:45:49.131040 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:45:49.131058 systemd[1]: Reached target cryptsetup.target. Sep 13 00:45:49.131076 systemd[1]: Reached target paths.target. Sep 13 00:45:49.131094 systemd[1]: Reached target slices.target. Sep 13 00:45:49.131116 systemd[1]: Reached target swap.target. Sep 13 00:45:49.131135 systemd[1]: Reached target timers.target. Sep 13 00:45:49.131155 systemd[1]: Listening on iscsid.socket. Sep 13 00:45:49.131173 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:45:49.131192 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:45:49.131211 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:45:49.131230 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:45:49.131248 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:45:49.131271 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:45:49.131290 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:45:49.131327 systemd[1]: Reached target sockets.target. Sep 13 00:45:49.131350 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:45:49.131369 systemd[1]: Finished network-cleanup.service. Sep 13 00:45:49.131389 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:45:49.131408 systemd[1]: Starting systemd-journald.service... Sep 13 00:45:49.131431 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:45:49.131450 systemd[1]: Starting systemd-resolved.service... Sep 13 00:45:49.131475 systemd-journald[189]: Journal started Sep 13 00:45:49.131585 systemd-journald[189]: Runtime Journal (/run/log/journal/dac9005f7e42c022465f500b9acc2ad4) is 8.0M, max 148.8M, 140.8M free. Sep 13 00:45:49.134820 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:45:49.135628 systemd-modules-load[190]: Inserted module 'overlay' Sep 13 00:45:49.166952 systemd[1]: Started systemd-journald.service. Sep 13 00:45:49.167120 kernel: audit: type=1130 audit(1757724349.141:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.167149 kernel: audit: type=1130 audit(1757724349.149:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.167321 kernel: audit: type=1130 audit(1757724349.154:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.143369 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:45:49.151168 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:45:49.156436 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:45:49.166225 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:45:49.171991 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:45:49.176641 systemd-resolved[191]: Positive Trust Anchors: Sep 13 00:45:49.177052 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:45:49.177210 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:45:49.182444 systemd-resolved[191]: Defaulting to hostname 'linux'. Sep 13 00:45:49.189062 systemd[1]: Started systemd-resolved.service. Sep 13 00:45:49.191086 systemd[1]: Reached target nss-lookup.target. Sep 13 00:45:49.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.199623 kernel: audit: type=1130 audit(1757724349.163:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.199686 kernel: audit: type=1130 audit(1757724349.187:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.204271 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:45:49.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.209745 kernel: audit: type=1130 audit(1757724349.203:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.215821 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:45:49.229864 kernel: audit: type=1130 audit(1757724349.218:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.221119 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:45:49.238679 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:45:49.243232 dracut-cmdline[205]: dracut-dracut-053 Sep 13 00:45:49.247249 systemd-modules-load[190]: Inserted module 'br_netfilter' Sep 13 00:45:49.250780 kernel: Bridge firewalling registered Sep 13 00:45:49.250824 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:45:49.277681 kernel: SCSI subsystem initialized Sep 13 00:45:49.297053 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:45:49.297129 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:45:49.297154 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:45:49.303745 systemd-modules-load[190]: Inserted module 'dm_multipath' Sep 13 00:45:49.305450 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:45:49.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.317100 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:45:49.330345 kernel: audit: type=1130 audit(1757724349.314:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.333191 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:45:49.344817 kernel: audit: type=1130 audit(1757724349.335:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.361696 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:45:49.382700 kernel: iscsi: registered transport (tcp) Sep 13 00:45:49.411271 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:45:49.411353 kernel: QLogic iSCSI HBA Driver Sep 13 00:45:49.457013 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:45:49.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.458736 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:45:49.516719 kernel: raid6: avx2x4 gen() 18074 MB/s Sep 13 00:45:49.533706 kernel: raid6: avx2x4 xor() 7913 MB/s Sep 13 00:45:49.550696 kernel: raid6: avx2x2 gen() 18095 MB/s Sep 13 00:45:49.567697 kernel: raid6: avx2x2 xor() 18615 MB/s Sep 13 00:45:49.585694 kernel: raid6: avx2x1 gen() 14106 MB/s Sep 13 00:45:49.602694 kernel: raid6: avx2x1 xor() 16198 MB/s Sep 13 00:45:49.619684 kernel: raid6: sse2x4 gen() 11062 MB/s Sep 13 00:45:49.636693 kernel: raid6: sse2x4 xor() 6663 MB/s Sep 13 00:45:49.654697 kernel: raid6: sse2x2 gen() 12014 MB/s Sep 13 00:45:49.671698 kernel: raid6: sse2x2 xor() 7434 MB/s Sep 13 00:45:49.688701 kernel: raid6: sse2x1 gen() 10564 MB/s Sep 13 00:45:49.706523 kernel: raid6: sse2x1 xor() 5187 MB/s Sep 13 00:45:49.706593 kernel: raid6: using algorithm avx2x2 gen() 18095 MB/s Sep 13 00:45:49.706617 kernel: raid6: .... xor() 18615 MB/s, rmw enabled Sep 13 00:45:49.707253 kernel: raid6: using avx2x2 recovery algorithm Sep 13 00:45:49.722697 kernel: xor: automatically using best checksumming function avx Sep 13 00:45:49.836692 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:45:49.848008 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:45:49.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.847000 audit: BPF prog-id=7 op=LOAD Sep 13 00:45:49.847000 audit: BPF prog-id=8 op=LOAD Sep 13 00:45:49.849405 systemd[1]: Starting systemd-udevd.service... Sep 13 00:45:49.867198 systemd-udevd[388]: Using default interface naming scheme 'v252'. Sep 13 00:45:49.886984 systemd[1]: Started systemd-udevd.service. Sep 13 00:45:49.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.897105 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:45:49.911809 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Sep 13 00:45:49.951208 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:45:49.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:49.952462 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:45:50.021002 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:45:50.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:50.105695 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:45:50.135688 kernel: scsi host0: Virtio SCSI HBA Sep 13 00:45:50.154461 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:45:50.164700 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Sep 13 00:45:50.171608 kernel: AES CTR mode by8 optimization enabled Sep 13 00:45:50.265162 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Sep 13 00:45:50.321376 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Sep 13 00:45:50.321553 kernel: sd 0:0:1:0: [sda] Write Protect is off Sep 13 00:45:50.321749 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Sep 13 00:45:50.321915 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 13 00:45:50.322054 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 13 00:45:50.322070 kernel: GPT:17805311 != 25165823 Sep 13 00:45:50.322091 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 13 00:45:50.322105 kernel: GPT:17805311 != 25165823 Sep 13 00:45:50.322117 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 13 00:45:50.322131 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:45:50.322145 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Sep 13 00:45:50.370681 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/sda6 scanned by (udev-worker) (443) Sep 13 00:45:50.376076 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:45:50.404591 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:45:50.404851 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:45:50.440801 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:45:50.465852 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:45:50.467100 systemd[1]: Starting disk-uuid.service... Sep 13 00:45:50.487958 disk-uuid[513]: Primary Header is updated. Sep 13 00:45:50.487958 disk-uuid[513]: Secondary Entries is updated. Sep 13 00:45:50.487958 disk-uuid[513]: Secondary Header is updated. Sep 13 00:45:50.526791 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:45:50.526822 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:45:50.543729 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:45:51.554683 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:45:51.555127 disk-uuid[514]: The operation has completed successfully. Sep 13 00:45:51.621573 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:45:51.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:51.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:51.621727 systemd[1]: Finished disk-uuid.service. Sep 13 00:45:51.632475 systemd[1]: Starting verity-setup.service... Sep 13 00:45:51.662783 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 13 00:45:51.740139 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:45:51.742620 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:45:51.769336 systemd[1]: Finished verity-setup.service. Sep 13 00:45:51.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:51.844682 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:45:51.845187 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:45:51.845587 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:45:51.900406 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:45:51.900446 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:45:51.900469 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:45:51.900492 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 13 00:45:51.846534 systemd[1]: Starting ignition-setup.service... Sep 13 00:45:51.866079 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:45:51.924591 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:45:51.944135 systemd[1]: Finished ignition-setup.service. Sep 13 00:45:51.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:51.945649 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:45:51.993603 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:45:52.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.001000 audit: BPF prog-id=9 op=LOAD Sep 13 00:45:52.003984 systemd[1]: Starting systemd-networkd.service... Sep 13 00:45:52.039022 systemd-networkd[688]: lo: Link UP Sep 13 00:45:52.039034 systemd-networkd[688]: lo: Gained carrier Sep 13 00:45:52.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.040086 systemd-networkd[688]: Enumeration completed Sep 13 00:45:52.040244 systemd[1]: Started systemd-networkd.service. Sep 13 00:45:52.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.040706 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:45:52.043343 systemd-networkd[688]: eth0: Link UP Sep 13 00:45:52.122790 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:45:52.122790 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 13 00:45:52.122790 iscsid[698]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:45:52.122790 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:45:52.122790 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:45:52.122790 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:45:52.122790 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:45:52.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.043351 systemd-networkd[688]: eth0: Gained carrier Sep 13 00:45:52.210016 ignition[645]: Ignition 2.14.0 Sep 13 00:45:52.047161 systemd[1]: Reached target network.target. Sep 13 00:45:52.210030 ignition[645]: Stage: fetch-offline Sep 13 00:45:52.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.053794 systemd-networkd[688]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-8-nightly-20250912-2100-06f444dd0ad3d7015747.c.flatcar-212911.internal' to 'ci-3510-3-8-nightly-20250912-2100-06f444dd0ad3d7015747' Sep 13 00:45:52.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.210102 ignition[645]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:45:52.053810 systemd-networkd[688]: eth0: DHCPv4 address 10.128.0.96/32, gateway 10.128.0.1 acquired from 169.254.169.254 Sep 13 00:45:52.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.210155 ignition[645]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Sep 13 00:45:52.069038 systemd[1]: Starting iscsiuio.service... Sep 13 00:45:52.228262 ignition[645]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Sep 13 00:45:52.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.080415 systemd[1]: Started iscsiuio.service. Sep 13 00:45:52.228474 ignition[645]: parsed url from cmdline: "" Sep 13 00:45:52.086539 systemd[1]: Starting iscsid.service... Sep 13 00:45:52.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.228481 ignition[645]: no config URL provided Sep 13 00:45:52.116071 systemd[1]: Started iscsid.service. Sep 13 00:45:52.228488 ignition[645]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:45:52.136616 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:45:52.228499 ignition[645]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:45:52.188272 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:45:52.228509 ignition[645]: failed to fetch config: resource requires networking Sep 13 00:45:52.219020 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:45:52.228919 ignition[645]: Ignition finished successfully Sep 13 00:45:52.227986 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:45:52.329971 ignition[712]: Ignition 2.14.0 Sep 13 00:45:52.248829 systemd[1]: Reached target remote-fs.target. Sep 13 00:45:52.329982 ignition[712]: Stage: fetch Sep 13 00:45:52.267082 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:45:52.330118 ignition[712]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:45:52.287210 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:45:52.330151 ignition[712]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Sep 13 00:45:52.302195 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:45:52.337223 ignition[712]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Sep 13 00:45:52.318078 systemd[1]: Starting ignition-fetch.service... Sep 13 00:45:52.337430 ignition[712]: parsed url from cmdline: "" Sep 13 00:45:52.346518 unknown[712]: fetched base config from "system" Sep 13 00:45:52.337440 ignition[712]: no config URL provided Sep 13 00:45:52.346532 unknown[712]: fetched base config from "system" Sep 13 00:45:52.337448 ignition[712]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:45:52.346542 unknown[712]: fetched user config from "gcp" Sep 13 00:45:52.337459 ignition[712]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:45:52.348725 systemd[1]: Finished ignition-fetch.service. Sep 13 00:45:52.337497 ignition[712]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Sep 13 00:45:52.365030 systemd[1]: Starting ignition-kargs.service... Sep 13 00:45:52.343445 ignition[712]: GET result: OK Sep 13 00:45:52.388671 systemd[1]: Finished ignition-kargs.service. Sep 13 00:45:52.343517 ignition[712]: parsing config with SHA512: c777db72845298cc3b57d0facb201153fddf2b5f29b0025d86282be2ee6428acfda3ce2f308de39ecce67e7e951cd65fe5dea01c09b3e13f6c5f83b9176d844e Sep 13 00:45:52.400179 systemd[1]: Starting ignition-disks.service... Sep 13 00:45:52.347103 ignition[712]: fetch: fetch complete Sep 13 00:45:52.422102 systemd[1]: Finished ignition-disks.service. Sep 13 00:45:52.347110 ignition[712]: fetch: fetch passed Sep 13 00:45:52.432107 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:45:52.347158 ignition[712]: Ignition finished successfully Sep 13 00:45:52.447826 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:45:52.378306 ignition[718]: Ignition 2.14.0 Sep 13 00:45:52.460806 systemd[1]: Reached target local-fs.target. Sep 13 00:45:52.378317 ignition[718]: Stage: kargs Sep 13 00:45:52.472808 systemd[1]: Reached target sysinit.target. Sep 13 00:45:52.378497 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:45:52.487826 systemd[1]: Reached target basic.target. Sep 13 00:45:52.378537 ignition[718]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Sep 13 00:45:52.502062 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:45:52.386319 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Sep 13 00:45:52.387509 ignition[718]: kargs: kargs passed Sep 13 00:45:52.387558 ignition[718]: Ignition finished successfully Sep 13 00:45:52.412773 ignition[724]: Ignition 2.14.0 Sep 13 00:45:52.412786 ignition[724]: Stage: disks Sep 13 00:45:52.412944 ignition[724]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:45:52.412970 ignition[724]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Sep 13 00:45:52.419970 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Sep 13 00:45:52.421113 ignition[724]: disks: disks passed Sep 13 00:45:52.421165 ignition[724]: Ignition finished successfully Sep 13 00:45:52.528672 systemd-fsck[732]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 13 00:45:52.794704 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:45:52.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:52.803894 systemd[1]: Mounting sysroot.mount... Sep 13 00:45:52.832820 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:45:52.830488 systemd[1]: Mounted sysroot.mount. Sep 13 00:45:52.840030 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:45:52.856917 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:45:52.863520 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 13 00:45:52.863574 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:45:52.863609 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:45:52.949070 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (738) Sep 13 00:45:52.949112 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:45:52.949137 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:45:52.949161 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:45:52.875450 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:45:52.907193 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:45:52.938864 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:45:52.950376 initrd-setup-root[745]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:45:52.994802 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 13 00:45:52.987046 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:45:53.008911 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:45:53.019811 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:45:53.029816 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:45:53.046697 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:45:53.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:53.047984 systemd[1]: Starting ignition-mount.service... Sep 13 00:45:53.069941 systemd[1]: Starting sysroot-boot.service... Sep 13 00:45:53.084223 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:45:53.084520 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:45:53.109812 ignition[804]: INFO : Ignition 2.14.0 Sep 13 00:45:53.109812 ignition[804]: INFO : Stage: mount Sep 13 00:45:53.109812 ignition[804]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:45:53.109812 ignition[804]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Sep 13 00:45:53.250546 kernel: kauditd_printk_skb: 24 callbacks suppressed Sep 13 00:45:53.250580 kernel: audit: type=1130 audit(1757724353.116:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:53.250606 kernel: audit: type=1130 audit(1757724353.155:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:53.250621 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by mount (813) Sep 13 00:45:53.250645 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:45:53.250684 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:45:53.250706 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:45:53.250720 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 13 00:45:53.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:53.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:53.115229 systemd[1]: Finished sysroot-boot.service. Sep 13 00:45:53.257996 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Sep 13 00:45:53.257996 ignition[804]: INFO : mount: mount passed Sep 13 00:45:53.257996 ignition[804]: INFO : Ignition finished successfully Sep 13 00:45:53.120276 systemd[1]: Finished ignition-mount.service. Sep 13 00:45:53.158387 systemd[1]: Starting ignition-files.service... Sep 13 00:45:53.311824 ignition[832]: INFO : Ignition 2.14.0 Sep 13 00:45:53.311824 ignition[832]: INFO : Stage: files Sep 13 00:45:53.311824 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:45:53.311824 ignition[832]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Sep 13 00:45:53.311824 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Sep 13 00:45:53.311824 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:45:53.311824 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:45:53.311824 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:45:53.198232 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:45:53.412862 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:45:53.412862 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:45:53.412862 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3502562010" Sep 13 00:45:53.412862 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3502562010": device or resource busy Sep 13 00:45:53.412862 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3502562010", trying btrfs: device or resource busy Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3502562010" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3502562010" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3502562010" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3502562010" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:45:53.412862 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063748539" Sep 13 00:45:53.267842 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:45:53.668823 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063748539": device or resource busy Sep 13 00:45:53.668823 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2063748539", trying btrfs: device or resource busy Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063748539" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063748539" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem2063748539" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem2063748539" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:45:53.668823 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Sep 13 00:45:53.317762 unknown[832]: wrote ssh authorized keys file for user: core Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3931417464" Sep 13 00:45:53.916892 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3931417464": device or resource busy Sep 13 00:45:53.916892 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3931417464", trying btrfs: device or resource busy Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3931417464" Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3931417464" Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem3931417464" Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem3931417464" Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:45:53.916892 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem175115922" Sep 13 00:45:53.916892 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem175115922": device or resource busy Sep 13 00:45:53.916892 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem175115922", trying btrfs: device or resource busy Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem175115922" Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem175115922" Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem175115922" Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem175115922" Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Sep 13 00:45:54.164858 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Sep 13 00:45:53.920902 systemd-networkd[688]: eth0: Gained IPv6LL Sep 13 00:45:54.378931 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 00:45:54.378931 ignition[832]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:45:54.378931 ignition[832]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:45:54.378931 ignition[832]: INFO : files: op(18): [started] processing unit "oem-gce.service" Sep 13 00:45:54.473827 kernel: audit: type=1130 audit(1757724354.403:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(1a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(1a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce.service" Sep 13 00:45:54.473986 ignition[832]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce.service" Sep 13 00:45:54.473986 ignition[832]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:45:54.473986 ignition[832]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:45:54.473986 ignition[832]: INFO : files: files passed Sep 13 00:45:54.473986 ignition[832]: INFO : Ignition finished successfully Sep 13 00:45:54.829855 kernel: audit: type=1130 audit(1757724354.482:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.829919 kernel: audit: type=1130 audit(1757724354.515:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.829945 kernel: audit: type=1131 audit(1757724354.515:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.829969 kernel: audit: type=1130 audit(1757724354.646:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.829999 kernel: audit: type=1131 audit(1757724354.668:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.830014 kernel: audit: type=1130 audit(1757724354.766:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.389380 systemd[1]: Finished ignition-files.service. Sep 13 00:45:54.414320 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:45:54.861862 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:45:54.903855 kernel: audit: type=1131 audit(1757724354.868:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.437019 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:45:54.438093 systemd[1]: Starting ignition-quench.service... Sep 13 00:45:54.463207 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:45:54.484401 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:45:54.484562 systemd[1]: Finished ignition-quench.service. Sep 13 00:45:54.517286 systemd[1]: Reached target ignition-complete.target. Sep 13 00:45:54.593982 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:45:54.627823 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:45:54.627964 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:45:54.669591 systemd[1]: Reached target initrd-fs.target. Sep 13 00:45:54.702004 systemd[1]: Reached target initrd.target. Sep 13 00:45:54.720044 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:45:54.721378 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:45:55.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.745158 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:45:54.769289 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:45:55.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.812300 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:45:55.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.816113 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:45:55.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.838207 systemd[1]: Stopped target timers.target. Sep 13 00:45:55.182833 ignition[870]: INFO : Ignition 2.14.0 Sep 13 00:45:55.182833 ignition[870]: INFO : Stage: umount Sep 13 00:45:55.182833 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:45:55.182833 ignition[870]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Sep 13 00:45:54.852086 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:45:55.233047 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Sep 13 00:45:55.233047 ignition[870]: INFO : umount: umount passed Sep 13 00:45:55.233047 ignition[870]: INFO : Ignition finished successfully Sep 13 00:45:55.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.852278 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:45:55.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.870388 systemd[1]: Stopped target initrd.target. Sep 13 00:45:55.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.911119 systemd[1]: Stopped target basic.target. Sep 13 00:45:55.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.935098 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:45:55.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.950129 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:45:54.966122 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:45:55.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:54.982143 systemd[1]: Stopped target remote-fs.target. Sep 13 00:45:54.997094 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:45:55.013149 systemd[1]: Stopped target sysinit.target. Sep 13 00:45:55.021215 systemd[1]: Stopped target local-fs.target. Sep 13 00:45:55.036241 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:45:55.064167 systemd[1]: Stopped target swap.target. Sep 13 00:45:55.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.077982 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:45:55.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.078219 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:45:55.097186 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:45:55.112973 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:45:55.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.113190 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:45:55.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.128130 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:45:55.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.550000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:45:55.128330 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:45:55.145122 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:45:55.145309 systemd[1]: Stopped ignition-files.service. Sep 13 00:45:55.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.161337 systemd[1]: Stopping ignition-mount.service... Sep 13 00:45:55.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.176566 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:45:55.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.209012 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:45:55.209264 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:45:55.248263 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:45:55.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.248457 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:45:55.262941 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:45:55.264208 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:45:55.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.264328 systemd[1]: Stopped ignition-mount.service. Sep 13 00:45:55.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.273566 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:45:55.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.273697 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:45:55.294537 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:45:55.294711 systemd[1]: Stopped ignition-disks.service. Sep 13 00:45:55.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.308940 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:45:55.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.309027 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:45:55.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.323906 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:45:55.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.323982 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:45:55.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:55.338878 systemd[1]: Stopped target network.target. Sep 13 00:45:55.352796 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:45:55.352903 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:45:55.368961 systemd[1]: Stopped target paths.target. Sep 13 00:45:55.383819 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:45:55.927058 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Sep 13 00:45:55.387782 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:45:55.936881 iscsid[698]: iscsid shutting down. Sep 13 00:45:55.398839 systemd[1]: Stopped target slices.target. Sep 13 00:45:55.412835 systemd[1]: Stopped target sockets.target. Sep 13 00:45:55.413051 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:45:55.413088 systemd[1]: Closed iscsid.socket. Sep 13 00:45:55.432916 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:45:55.432985 systemd[1]: Closed iscsiuio.socket. Sep 13 00:45:55.446885 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:45:55.446985 systemd[1]: Stopped ignition-setup.service. Sep 13 00:45:55.461957 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:45:55.462042 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:45:55.477160 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:45:55.480755 systemd-networkd[688]: eth0: DHCPv6 lease lost Sep 13 00:45:55.492000 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:45:55.505326 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:45:55.505468 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:45:55.520576 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:45:55.520743 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:45:55.536594 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:45:55.536734 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:45:55.553102 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:45:55.553145 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:45:55.571931 systemd[1]: Stopping network-cleanup.service... Sep 13 00:45:55.585829 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:45:55.585953 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:45:55.601981 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:45:55.602062 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:45:55.617081 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:45:55.617149 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:45:55.632066 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:45:55.658470 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:45:55.659156 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:45:55.659311 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:45:55.674286 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:45:55.674363 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:45:55.691010 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:45:55.691063 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:45:55.705954 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:45:55.706032 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:45:55.722042 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:45:55.722120 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:45:55.738039 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:45:55.738112 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:45:55.754039 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:45:55.775820 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 13 00:45:55.775944 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 13 00:45:55.784213 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:45:55.784275 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:45:55.805989 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:45:55.806073 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:45:55.823427 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 13 00:45:55.824118 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:45:55.824234 systemd[1]: Stopped network-cleanup.service. Sep 13 00:45:55.837200 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:45:55.837316 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:45:55.854229 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:45:55.869964 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:45:55.894594 systemd[1]: Switching root. Sep 13 00:45:55.939449 systemd-journald[189]: Journal stopped Sep 13 00:46:00.663543 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:46:00.664263 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:46:00.664309 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:46:00.664340 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:46:00.664364 kernel: SELinux: policy capability open_perms=1 Sep 13 00:46:00.664394 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:46:00.664513 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:46:00.664561 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:46:00.664586 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:46:00.664609 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:46:00.664630 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:46:00.664681 systemd[1]: Successfully loaded SELinux policy in 111.237ms. Sep 13 00:46:00.664741 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.707ms. Sep 13 00:46:00.664769 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:46:00.664796 systemd[1]: Detected virtualization kvm. Sep 13 00:46:00.664828 systemd[1]: Detected architecture x86-64. Sep 13 00:46:00.664858 systemd[1]: Detected first boot. Sep 13 00:46:00.664891 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:46:00.664917 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:46:00.664941 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:46:00.664968 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:46:00.665007 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:46:00.665052 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:46:00.665086 kernel: kauditd_printk_skb: 49 callbacks suppressed Sep 13 00:46:00.665111 kernel: audit: type=1334 audit(1757724359.689:87): prog-id=12 op=LOAD Sep 13 00:46:00.665134 kernel: audit: type=1334 audit(1757724359.690:88): prog-id=3 op=UNLOAD Sep 13 00:46:00.665156 kernel: audit: type=1334 audit(1757724359.695:89): prog-id=13 op=LOAD Sep 13 00:46:00.665180 kernel: audit: type=1334 audit(1757724359.702:90): prog-id=14 op=LOAD Sep 13 00:46:00.665203 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:46:00.665227 kernel: audit: type=1334 audit(1757724359.702:91): prog-id=4 op=UNLOAD Sep 13 00:46:00.665250 kernel: audit: type=1334 audit(1757724359.702:92): prog-id=5 op=UNLOAD Sep 13 00:46:00.665273 kernel: audit: type=1131 audit(1757724359.704:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.665295 systemd[1]: Stopped iscsiuio.service. Sep 13 00:46:00.665318 kernel: audit: type=1334 audit(1757724359.771:94): prog-id=12 op=UNLOAD Sep 13 00:46:00.665340 kernel: audit: type=1131 audit(1757724359.785:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.665366 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:46:00.665389 systemd[1]: Stopped iscsid.service. Sep 13 00:46:00.665415 kernel: audit: type=1131 audit(1757724359.826:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.665438 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:46:00.665462 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:46:00.665486 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:46:00.665510 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:46:00.665537 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:46:00.665561 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 13 00:46:00.665584 systemd[1]: Created slice system-getty.slice. Sep 13 00:46:00.665607 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:46:00.665630 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:46:00.665672 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:46:00.665698 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:46:00.665723 systemd[1]: Created slice user.slice. Sep 13 00:46:00.665748 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:46:00.665776 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:46:00.665800 systemd[1]: Set up automount boot.automount. Sep 13 00:46:00.665826 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:46:00.665851 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:46:00.665875 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:46:00.665898 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:46:00.665924 systemd[1]: Reached target integritysetup.target. Sep 13 00:46:00.665952 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:46:00.665974 systemd[1]: Reached target remote-fs.target. Sep 13 00:46:00.665997 systemd[1]: Reached target slices.target. Sep 13 00:46:00.666035 systemd[1]: Reached target swap.target. Sep 13 00:46:00.666061 systemd[1]: Reached target torcx.target. Sep 13 00:46:00.666090 systemd[1]: Reached target veritysetup.target. Sep 13 00:46:00.666115 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:46:00.666138 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:46:00.666164 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:46:00.666189 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:46:00.666213 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:46:00.666238 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:46:00.666266 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:46:00.666290 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:46:00.666318 systemd[1]: Mounting media.mount... Sep 13 00:46:00.666343 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:00.666367 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:46:00.666399 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:46:00.666424 systemd[1]: Mounting tmp.mount... Sep 13 00:46:00.666448 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:46:00.666473 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:00.666505 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:46:00.666530 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:46:00.666554 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:00.666578 systemd[1]: Starting modprobe@drm.service... Sep 13 00:46:00.666602 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:00.666626 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:46:00.666650 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:00.666690 kernel: fuse: init (API version 7.34) Sep 13 00:46:00.666715 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:46:00.666743 kernel: loop: module loaded Sep 13 00:46:00.666767 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:46:00.666790 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:46:00.666815 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:46:00.666839 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:46:00.666863 systemd[1]: Stopped systemd-journald.service. Sep 13 00:46:00.666887 systemd[1]: Starting systemd-journald.service... Sep 13 00:46:00.666910 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:46:00.666935 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:46:00.666964 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:46:00.666995 systemd-journald[995]: Journal started Sep 13 00:46:00.667112 systemd-journald[995]: Runtime Journal (/run/log/journal/dac9005f7e42c022465f500b9acc2ad4) is 8.0M, max 148.8M, 140.8M free. Sep 13 00:45:55.938000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:45:56.231000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:45:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:45:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:45:56.385000 audit: BPF prog-id=10 op=LOAD Sep 13 00:45:56.385000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:45:56.385000 audit: BPF prog-id=11 op=LOAD Sep 13 00:45:56.385000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:45:56.544000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:45:56.544000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e4 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:45:56.544000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:45:56.554000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:45:56.554000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859c9 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:45:56.554000 audit: CWD cwd="/" Sep 13 00:45:56.554000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:45:56.554000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:45:56.554000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:45:59.689000 audit: BPF prog-id=12 op=LOAD Sep 13 00:45:59.690000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:45:59.695000 audit: BPF prog-id=13 op=LOAD Sep 13 00:45:59.702000 audit: BPF prog-id=14 op=LOAD Sep 13 00:45:59.702000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:45:59.702000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:45:59.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.771000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:45:59.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.612000 audit: BPF prog-id=15 op=LOAD Sep 13 00:46:00.612000 audit: BPF prog-id=16 op=LOAD Sep 13 00:46:00.612000 audit: BPF prog-id=17 op=LOAD Sep 13 00:46:00.612000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:46:00.612000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:46:00.659000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:46:00.659000 audit[995]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffb4b9ffa0 a2=4000 a3=7fffb4ba003c items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:00.659000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:45:59.688027 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:45:56.539004 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:45:59.688044 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 00:45:56.539987 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:45:59.705347 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:45:56.540012 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:45:56.540052 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:45:56.540064 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:45:56.540106 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:45:56.540130 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:45:56.540348 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:45:56.540401 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:45:56.540417 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:45:56.544156 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:45:56.544230 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:45:56.544266 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:45:56.544295 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:45:56.544327 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:45:56.544354 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:45:59.055564 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:45:59.055895 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:45:59.056049 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:45:59.056296 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:45:59.056360 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:45:59.056434 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-09-13T00:45:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:46:00.688689 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:46:00.704701 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:46:00.704845 systemd[1]: Stopped verity-setup.service. Sep 13 00:46:00.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.729680 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:00.738681 systemd[1]: Started systemd-journald.service. Sep 13 00:46:00.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.748186 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:46:00.756086 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:46:00.763061 systemd[1]: Mounted media.mount. Sep 13 00:46:00.771074 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:46:00.780032 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:46:00.789015 systemd[1]: Mounted tmp.mount. Sep 13 00:46:00.796177 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:46:00.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.805272 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:46:00.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.814282 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:46:00.814529 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:46:00.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.824329 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:00.824569 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:00.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.833328 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:46:00.833554 systemd[1]: Finished modprobe@drm.service. Sep 13 00:46:00.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.842303 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:00.842538 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:00.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.851355 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:46:00.851586 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:46:00.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.860316 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:00.860537 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:00.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.869364 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:46:00.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.878328 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:46:00.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.887302 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:46:00.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.896245 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:46:00.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.905608 systemd[1]: Reached target network-pre.target. Sep 13 00:46:00.915939 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:46:00.926345 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:46:00.934811 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:46:00.937989 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:46:00.946770 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:46:00.958297 systemd-journald[995]: Time spent on flushing to /var/log/journal/dac9005f7e42c022465f500b9acc2ad4 is 59.463ms for 1133 entries. Sep 13 00:46:00.958297 systemd-journald[995]: System Journal (/var/log/journal/dac9005f7e42c022465f500b9acc2ad4) is 8.0M, max 584.8M, 576.8M free. Sep 13 00:46:01.072857 systemd-journald[995]: Received client request to flush runtime journal. Sep 13 00:46:01.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.954865 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:00.956860 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:46:00.971892 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:00.973862 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:46:01.074007 udevadm[1009]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 00:46:00.982712 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:46:00.991551 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:46:01.002122 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:46:01.011775 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:46:01.020171 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:46:01.029335 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:46:01.041593 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:46:01.072191 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:46:01.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.081507 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:46:01.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.092808 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:46:01.160858 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:46:01.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.684997 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:46:01.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.693000 audit: BPF prog-id=18 op=LOAD Sep 13 00:46:01.693000 audit: BPF prog-id=19 op=LOAD Sep 13 00:46:01.693000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:46:01.693000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:46:01.695793 systemd[1]: Starting systemd-udevd.service... Sep 13 00:46:01.718971 systemd-udevd[1015]: Using default interface naming scheme 'v252'. Sep 13 00:46:01.768925 systemd[1]: Started systemd-udevd.service. Sep 13 00:46:01.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.779000 audit: BPF prog-id=20 op=LOAD Sep 13 00:46:01.782794 systemd[1]: Starting systemd-networkd.service... Sep 13 00:46:01.793000 audit: BPF prog-id=21 op=LOAD Sep 13 00:46:01.793000 audit: BPF prog-id=22 op=LOAD Sep 13 00:46:01.793000 audit: BPF prog-id=23 op=LOAD Sep 13 00:46:01.796688 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:46:01.850573 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:46:01.876754 systemd[1]: Started systemd-userdbd.service. Sep 13 00:46:01.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.002160 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Sep 13 00:46:02.034724 systemd-networkd[1030]: lo: Link UP Sep 13 00:46:02.035190 systemd-networkd[1030]: lo: Gained carrier Sep 13 00:46:02.036234 systemd-networkd[1030]: Enumeration completed Sep 13 00:46:02.036548 systemd[1]: Started systemd-networkd.service. Sep 13 00:46:02.037184 systemd-networkd[1030]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:46:02.039089 systemd-networkd[1030]: eth0: Link UP Sep 13 00:46:02.039103 systemd-networkd[1030]: eth0: Gained carrier Sep 13 00:46:02.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.050883 systemd-networkd[1030]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-8-nightly-20250912-2100-06f444dd0ad3d7015747.c.flatcar-212911.internal' to 'ci-3510-3-8-nightly-20250912-2100-06f444dd0ad3d7015747' Sep 13 00:46:02.050917 systemd-networkd[1030]: eth0: DHCPv4 address 10.128.0.96/32, gateway 10.128.0.1 acquired from 169.254.169.254 Sep 13 00:46:02.086694 kernel: ACPI: button: Power Button [PWRF] Sep 13 00:46:02.073000 audit[1040]: AVC avc: denied { confidentiality } for pid=1040 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:46:02.141686 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Sep 13 00:46:02.157688 kernel: ACPI: button: Sleep Button [SLPF] Sep 13 00:46:02.073000 audit[1040]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562edeab70a0 a1=338ec a2=7f6f08e79bc5 a3=5 items=110 ppid=1015 pid=1040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:02.073000 audit: CWD cwd="/" Sep 13 00:46:02.073000 audit: PATH item=0 name=(null) inode=1043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=1 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=2 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=3 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=4 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=5 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=6 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=7 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=8 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=9 name=(null) inode=14033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=10 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=11 name=(null) inode=14034 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=12 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=13 name=(null) inode=14035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=14 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=15 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=16 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=17 name=(null) inode=14037 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=18 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=19 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=20 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=21 name=(null) inode=14039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=22 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=23 name=(null) inode=14040 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=24 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=25 name=(null) inode=14041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=26 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=27 name=(null) inode=14042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=28 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=29 name=(null) inode=14043 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=30 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=31 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=32 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=33 name=(null) inode=14045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=34 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=35 name=(null) inode=14046 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=36 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=37 name=(null) inode=14047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=38 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=39 name=(null) inode=14048 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=40 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=41 name=(null) inode=14049 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=42 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=43 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=44 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=45 name=(null) inode=14051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=46 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=47 name=(null) inode=14052 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=48 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=49 name=(null) inode=14053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=50 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=51 name=(null) inode=14054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=52 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=53 name=(null) inode=14055 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=54 name=(null) inode=1043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=55 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=56 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=57 name=(null) inode=14057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=58 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=59 name=(null) inode=14058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=60 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=61 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=62 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=63 name=(null) inode=14060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=64 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=65 name=(null) inode=14061 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=66 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=67 name=(null) inode=14062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=68 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=69 name=(null) inode=14063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=70 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=71 name=(null) inode=14064 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=72 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=73 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=74 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=75 name=(null) inode=14066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=76 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=77 name=(null) inode=14067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=78 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=79 name=(null) inode=14068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=80 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=81 name=(null) inode=14069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=82 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=83 name=(null) inode=14070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=84 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=85 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=86 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=87 name=(null) inode=14072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=88 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=89 name=(null) inode=14073 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=90 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=91 name=(null) inode=14074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=92 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=93 name=(null) inode=14075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=94 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=95 name=(null) inode=14076 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=96 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=97 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=98 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=99 name=(null) inode=14078 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=100 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=101 name=(null) inode=14079 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=102 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=103 name=(null) inode=14080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=104 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=105 name=(null) inode=14081 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=106 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=107 name=(null) inode=14082 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PATH item=109 name=(null) inode=14083 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:02.073000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:46:02.172287 kernel: EDAC MC: Ver: 3.0.0 Sep 13 00:46:02.185694 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Sep 13 00:46:02.208686 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Sep 13 00:46:02.212435 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:46:02.221726 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:46:02.239200 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:46:02.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.250595 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:46:02.281903 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:46:02.315143 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:46:02.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.324045 systemd[1]: Reached target cryptsetup.target. Sep 13 00:46:02.334368 systemd[1]: Starting lvm2-activation.service... Sep 13 00:46:02.340779 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:46:02.369238 systemd[1]: Finished lvm2-activation.service. Sep 13 00:46:02.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.378071 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:46:02.386873 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:46:02.386930 systemd[1]: Reached target local-fs.target. Sep 13 00:46:02.395856 systemd[1]: Reached target machines.target. Sep 13 00:46:02.405462 systemd[1]: Starting ldconfig.service... Sep 13 00:46:02.414054 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:02.414159 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:02.415872 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:46:02.424594 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:46:02.436771 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:46:02.438958 systemd[1]: Starting systemd-sysext.service... Sep 13 00:46:02.439626 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1055 (bootctl) Sep 13 00:46:02.442595 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:46:02.466900 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:46:02.475251 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:46:02.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.487450 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:46:02.487680 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:46:02.512731 kernel: loop0: detected capacity change from 0 to 221472 Sep 13 00:46:02.625764 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Sep 13 00:46:02.625764 systemd-fsck[1066]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 00:46:02.628825 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:46:02.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.640644 systemd[1]: Mounting boot.mount... Sep 13 00:46:02.672820 systemd[1]: Mounted boot.mount. Sep 13 00:46:02.697119 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:46:02.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.837744 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:46:02.855883 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:46:02.858005 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:46:02.869705 kernel: loop1: detected capacity change from 0 to 221472 Sep 13 00:46:02.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.900710 (sd-sysext)[1070]: Using extensions 'kubernetes'. Sep 13 00:46:02.902748 (sd-sysext)[1070]: Merged extensions into '/usr'. Sep 13 00:46:02.927506 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:02.930776 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:46:02.938383 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:02.941032 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:02.950845 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:02.959798 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:02.966907 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:02.967140 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:02.967321 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:02.972122 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:46:02.979449 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:02.979763 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:02.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.988912 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:02.989134 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:02.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.998543 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:02.998770 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:03.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.007575 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:03.007805 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.009990 systemd[1]: Finished systemd-sysext.service. Sep 13 00:46:03.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.020809 systemd[1]: Starting ensure-sysext.service... Sep 13 00:46:03.029719 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:46:03.042715 systemd[1]: Reloading. Sep 13 00:46:03.060640 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:46:03.063562 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:46:03.068230 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:46:03.097535 ldconfig[1054]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:46:03.184024 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-09-13T00:46:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:46:03.185376 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-09-13T00:46:03Z" level=info msg="torcx already run" Sep 13 00:46:03.351971 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:46:03.352252 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:46:03.376679 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:46:03.452000 audit: BPF prog-id=24 op=LOAD Sep 13 00:46:03.452000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:46:03.454000 audit: BPF prog-id=25 op=LOAD Sep 13 00:46:03.454000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:46:03.455000 audit: BPF prog-id=26 op=LOAD Sep 13 00:46:03.455000 audit: BPF prog-id=27 op=LOAD Sep 13 00:46:03.455000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:46:03.455000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:46:03.458000 audit: BPF prog-id=28 op=LOAD Sep 13 00:46:03.458000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:46:03.458000 audit: BPF prog-id=29 op=LOAD Sep 13 00:46:03.458000 audit: BPF prog-id=30 op=LOAD Sep 13 00:46:03.458000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:46:03.459000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:46:03.459000 audit: BPF prog-id=31 op=LOAD Sep 13 00:46:03.459000 audit: BPF prog-id=32 op=LOAD Sep 13 00:46:03.459000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:46:03.459000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:46:03.464584 systemd[1]: Finished ldconfig.service. Sep 13 00:46:03.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.474681 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:46:03.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.491079 systemd[1]: Starting audit-rules.service... Sep 13 00:46:03.499762 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:46:03.510156 systemd[1]: Starting oem-gce-enable-oslogin.service... Sep 13 00:46:03.520726 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:46:03.532141 systemd[1]: Starting systemd-resolved.service... Sep 13 00:46:03.528000 audit: BPF prog-id=33 op=LOAD Sep 13 00:46:03.542140 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:46:03.538000 audit: BPF prog-id=34 op=LOAD Sep 13 00:46:03.551030 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:46:03.559800 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:46:03.560000 audit[1165]: SYSTEM_BOOT pid=1165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.570731 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Sep 13 00:46:03.571024 systemd[1]: Finished oem-gce-enable-oslogin.service. Sep 13 00:46:03.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:03.585534 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:03.586137 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.589139 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:03.593000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:46:03.593000 audit[1171]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff75398160 a2=420 a3=0 items=0 ppid=1141 pid=1171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:03.593000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:46:03.595119 augenrules[1171]: No rules Sep 13 00:46:03.598060 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:03.607126 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:03.616267 systemd[1]: Starting oem-gce-enable-oslogin.service... Sep 13 00:46:03.622961 enable-oslogin[1179]: /etc/pam.d/sshd already exists. Not enabling OS Login Sep 13 00:46:03.624904 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.625260 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:03.625548 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:46:03.625815 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:03.628960 systemd[1]: Finished audit-rules.service. Sep 13 00:46:03.637437 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:46:03.647908 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:03.648270 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:03.657862 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:03.658119 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:03.666766 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:03.666990 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:03.676773 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Sep 13 00:46:03.677012 systemd[1]: Finished oem-gce-enable-oslogin.service. Sep 13 00:46:03.687095 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:03.687419 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.690283 systemd[1]: Starting systemd-update-done.service... Sep 13 00:46:03.698928 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:46:03.705193 systemd-resolved[1156]: Positive Trust Anchors: Sep 13 00:46:03.705214 systemd-resolved[1156]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:46:03.705266 systemd-resolved[1156]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:46:03.708991 systemd[1]: Finished systemd-update-done.service. Sep 13 00:46:03.712826 systemd-networkd[1030]: eth0: Gained IPv6LL Sep 13 00:46:03.723536 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:03.724021 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.728469 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:03.728861 systemd-resolved[1156]: Defaulting to hostname 'linux'. Sep 13 00:46:03.738013 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:03.747027 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:03.756033 systemd[1]: Starting oem-gce-enable-oslogin.service... Sep 13 00:46:03.763121 enable-oslogin[1184]: /etc/pam.d/sshd already exists. Not enabling OS Login Sep 13 00:46:03.764899 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.765166 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:03.765356 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:46:03.765508 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:03.767389 systemd[1]: Started systemd-resolved.service. Sep 13 00:46:03.776821 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:03.777085 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:03.786596 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:03.786881 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:03.351618 systemd-resolved[1156]: Clock change detected. Flushing caches. Sep 13 00:46:03.393799 systemd-journald[995]: Time jumped backwards, rotating. Sep 13 00:46:03.351786 systemd-timesyncd[1161]: Contacted time server 169.254.169.254:123 (169.254.169.254). Sep 13 00:46:03.351872 systemd-timesyncd[1161]: Initial clock synchronization to Sat 2025-09-13 00:46:03.351545 UTC. Sep 13 00:46:03.365166 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:46:03.374947 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:03.375209 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:03.384536 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Sep 13 00:46:03.384825 systemd[1]: Finished oem-gce-enable-oslogin.service. Sep 13 00:46:03.394682 systemd[1]: Reached target network.target. Sep 13 00:46:03.403800 systemd[1]: Reached target nss-lookup.target. Sep 13 00:46:03.412844 systemd[1]: Reached target time-set.target. Sep 13 00:46:03.421837 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:03.422095 systemd[1]: Reached target sysinit.target. Sep 13 00:46:03.430953 systemd[1]: Started motdgen.path. Sep 13 00:46:03.437945 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:46:03.448164 systemd[1]: Started logrotate.timer. Sep 13 00:46:03.456070 systemd[1]: Started mdadm.timer. Sep 13 00:46:03.463898 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:46:03.472813 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:46:03.473046 systemd[1]: Reached target paths.target. Sep 13 00:46:03.480844 systemd[1]: Reached target timers.target. Sep 13 00:46:03.488381 systemd[1]: Listening on dbus.socket. Sep 13 00:46:03.497684 systemd[1]: Starting docker.socket... Sep 13 00:46:03.509309 systemd[1]: Listening on sshd.socket. Sep 13 00:46:03.516964 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:03.517292 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.520322 systemd[1]: Listening on docker.socket. Sep 13 00:46:03.530480 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:46:03.530721 systemd[1]: Reached target sockets.target. Sep 13 00:46:03.539846 systemd[1]: Reached target basic.target. Sep 13 00:46:03.546838 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.547054 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:46:03.549033 systemd[1]: Starting containerd.service... Sep 13 00:46:03.557755 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 13 00:46:03.568697 systemd[1]: Starting dbus.service... Sep 13 00:46:03.576951 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:46:03.588005 systemd[1]: Starting extend-filesystems.service... Sep 13 00:46:03.603942 jq[1192]: false Sep 13 00:46:03.595651 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:46:03.598210 systemd[1]: Starting modprobe@drm.service... Sep 13 00:46:03.608651 systemd[1]: Starting motdgen.service... Sep 13 00:46:03.616866 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:46:03.625924 systemd[1]: Starting sshd-keygen.service... Sep 13 00:46:03.636252 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:46:03.644639 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:03.644933 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Sep 13 00:46:03.645836 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:46:03.647964 systemd[1]: Starting update-engine.service... Sep 13 00:46:03.657837 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:46:03.663031 jq[1210]: true Sep 13 00:46:03.672287 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:46:03.672650 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:46:03.674134 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:46:03.676730 systemd[1]: Finished modprobe@drm.service. Sep 13 00:46:03.687889 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:46:03.688151 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:46:03.698994 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:46:03.704057 extend-filesystems[1193]: Found loop1 Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda1 Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda2 Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda3 Sep 13 00:46:03.715671 extend-filesystems[1193]: Found usr Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda4 Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda6 Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda7 Sep 13 00:46:03.715671 extend-filesystems[1193]: Found sda9 Sep 13 00:46:03.715671 extend-filesystems[1193]: Checking size of /dev/sda9 Sep 13 00:46:03.826062 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Sep 13 00:46:03.709529 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:46:03.827382 update_engine[1208]: I0913 00:46:03.796444 1208 main.cc:92] Flatcar Update Engine starting Sep 13 00:46:03.827382 update_engine[1208]: I0913 00:46:03.804207 1208 update_check_scheduler.cc:74] Next update check in 7m1s Sep 13 00:46:03.752802 dbus-daemon[1191]: [system] SELinux support is enabled Sep 13 00:46:03.850249 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Sep 13 00:46:03.850322 extend-filesystems[1193]: Resized partition /dev/sda9 Sep 13 00:46:03.709774 systemd[1]: Finished motdgen.service. Sep 13 00:46:03.769312 dbus-daemon[1191]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1030 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 13 00:46:03.860687 extend-filesystems[1230]: resize2fs 1.46.5 (30-Dec-2021) Sep 13 00:46:03.860687 extend-filesystems[1230]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Sep 13 00:46:03.860687 extend-filesystems[1230]: old_desc_blocks = 1, new_desc_blocks = 2 Sep 13 00:46:03.860687 extend-filesystems[1230]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Sep 13 00:46:03.736773 systemd[1]: Reached target network-online.target. Sep 13 00:46:03.862299 dbus-daemon[1191]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:46:03.929015 extend-filesystems[1193]: Resized filesystem in /dev/sda9 Sep 13 00:46:03.944709 jq[1218]: true Sep 13 00:46:03.745840 systemd[1]: Starting kubelet.service... Sep 13 00:46:03.764982 systemd[1]: Starting oem-gce.service... Sep 13 00:46:03.775121 systemd[1]: Starting systemd-logind.service... Sep 13 00:46:03.802523 systemd[1]: Started dbus.service. Sep 13 00:46:03.842721 systemd[1]: Finished ensure-sysext.service. Sep 13 00:46:03.858836 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:46:03.858904 systemd[1]: Reached target system-config.target. Sep 13 00:46:03.946267 mkfs.ext4[1240]: mke2fs 1.46.5 (30-Dec-2021) Sep 13 00:46:03.946267 mkfs.ext4[1240]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Sep 13 00:46:03.946267 mkfs.ext4[1240]: Creating filesystem with 262144 4k blocks and 65536 inodes Sep 13 00:46:03.946267 mkfs.ext4[1240]: Filesystem UUID: 8cae7997-2aed-4648-81d6-8d2fe684d1b9 Sep 13 00:46:03.946267 mkfs.ext4[1240]: Superblock backups stored on blocks: Sep 13 00:46:03.946267 mkfs.ext4[1240]: 32768, 98304, 163840, 229376 Sep 13 00:46:03.946267 mkfs.ext4[1240]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Sep 13 00:46:03.946267 mkfs.ext4[1240]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Sep 13 00:46:03.946267 mkfs.ext4[1240]: Creating journal (8192 blocks): done Sep 13 00:46:03.946267 mkfs.ext4[1240]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Sep 13 00:46:03.868908 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:46:03.868965 systemd[1]: Reached target user-config.target. Sep 13 00:46:03.879726 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:46:03.880003 systemd[1]: Finished extend-filesystems.service. Sep 13 00:46:03.901091 systemd[1]: Started update-engine.service. Sep 13 00:46:03.925321 systemd[1]: Started locksmithd.service. Sep 13 00:46:03.939568 systemd[1]: Starting systemd-hostnamed.service... Sep 13 00:46:04.003056 systemd-logind[1228]: Watching system buttons on /dev/input/event1 (Power Button) Sep 13 00:46:04.003157 systemd-logind[1228]: Watching system buttons on /dev/input/event2 (Sleep Button) Sep 13 00:46:04.003193 systemd-logind[1228]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:46:04.005376 bash[1255]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:46:04.013894 env[1219]: time="2025-09-13T00:46:04.013817456Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:46:04.019773 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:46:04.031690 umount[1256]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Sep 13 00:46:04.035030 systemd-logind[1228]: New seat seat0. Sep 13 00:46:04.047627 systemd[1]: Started systemd-logind.service. Sep 13 00:46:04.060509 kernel: loop2: detected capacity change from 0 to 2097152 Sep 13 00:46:04.081228 coreos-metadata[1190]: Sep 13 00:46:04.081 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Sep 13 00:46:04.088104 coreos-metadata[1190]: Sep 13 00:46:04.087 INFO Fetch failed with 404: resource not found Sep 13 00:46:04.088432 coreos-metadata[1190]: Sep 13 00:46:04.088 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Sep 13 00:46:04.090542 coreos-metadata[1190]: Sep 13 00:46:04.090 INFO Fetch successful Sep 13 00:46:04.090809 coreos-metadata[1190]: Sep 13 00:46:04.090 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Sep 13 00:46:04.091520 coreos-metadata[1190]: Sep 13 00:46:04.091 INFO Fetch failed with 404: resource not found Sep 13 00:46:04.091744 coreos-metadata[1190]: Sep 13 00:46:04.091 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Sep 13 00:46:04.092841 coreos-metadata[1190]: Sep 13 00:46:04.092 INFO Fetch failed with 404: resource not found Sep 13 00:46:04.093090 coreos-metadata[1190]: Sep 13 00:46:04.092 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Sep 13 00:46:04.094509 coreos-metadata[1190]: Sep 13 00:46:04.094 INFO Fetch successful Sep 13 00:46:04.100277 unknown[1190]: wrote ssh authorized keys file for user: core Sep 13 00:46:04.129569 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:46:04.147226 update-ssh-keys[1261]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:46:04.147986 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 13 00:46:04.165225 env[1219]: time="2025-09-13T00:46:04.165162860Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:46:04.165839 env[1219]: time="2025-09-13T00:46:04.165795522Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:04.170625 env[1219]: time="2025-09-13T00:46:04.170558027Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:46:04.170625 env[1219]: time="2025-09-13T00:46:04.170620763Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:04.213236 env[1219]: time="2025-09-13T00:46:04.213171966Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:46:04.213410 env[1219]: time="2025-09-13T00:46:04.213247314Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:04.213410 env[1219]: time="2025-09-13T00:46:04.213276180Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:46:04.213410 env[1219]: time="2025-09-13T00:46:04.213384544Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:04.213737 env[1219]: time="2025-09-13T00:46:04.213683645Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:04.214225 env[1219]: time="2025-09-13T00:46:04.214174484Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:04.215860 env[1219]: time="2025-09-13T00:46:04.215082790Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:46:04.215860 env[1219]: time="2025-09-13T00:46:04.215138305Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:46:04.215860 env[1219]: time="2025-09-13T00:46:04.215277482Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:46:04.215860 env[1219]: time="2025-09-13T00:46:04.215301152Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:46:04.248587 env[1219]: time="2025-09-13T00:46:04.248511378Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:46:04.248731 env[1219]: time="2025-09-13T00:46:04.248605739Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:46:04.248731 env[1219]: time="2025-09-13T00:46:04.248646425Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:46:04.248731 env[1219]: time="2025-09-13T00:46:04.248718275Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.248885 env[1219]: time="2025-09-13T00:46:04.248743201Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.248885 env[1219]: time="2025-09-13T00:46:04.248843754Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.248885 env[1219]: time="2025-09-13T00:46:04.248867552Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.249017 env[1219]: time="2025-09-13T00:46:04.248913557Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.249017 env[1219]: time="2025-09-13T00:46:04.248938714Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.249017 env[1219]: time="2025-09-13T00:46:04.248979806Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.249017 env[1219]: time="2025-09-13T00:46:04.249005221Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.249184 env[1219]: time="2025-09-13T00:46:04.249028125Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:46:04.249277 env[1219]: time="2025-09-13T00:46:04.249249063Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:46:04.249464 env[1219]: time="2025-09-13T00:46:04.249437526Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:46:04.250096 env[1219]: time="2025-09-13T00:46:04.250066805Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:46:04.250171 env[1219]: time="2025-09-13T00:46:04.250143321Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250224 env[1219]: time="2025-09-13T00:46:04.250171735Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:46:04.250385 env[1219]: time="2025-09-13T00:46:04.250266016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250452 env[1219]: time="2025-09-13T00:46:04.250394946Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250452 env[1219]: time="2025-09-13T00:46:04.250420996Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250557 env[1219]: time="2025-09-13T00:46:04.250458893Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250557 env[1219]: time="2025-09-13T00:46:04.250521449Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250557 env[1219]: time="2025-09-13T00:46:04.250545129Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250697 env[1219]: time="2025-09-13T00:46:04.250565634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250697 env[1219]: time="2025-09-13T00:46:04.250612120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.250697 env[1219]: time="2025-09-13T00:46:04.250638167Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:46:04.250951 env[1219]: time="2025-09-13T00:46:04.250897893Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.251086 env[1219]: time="2025-09-13T00:46:04.250958348Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.251086 env[1219]: time="2025-09-13T00:46:04.250981896Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.251086 env[1219]: time="2025-09-13T00:46:04.251022706Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:46:04.251086 env[1219]: time="2025-09-13T00:46:04.251054870Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:46:04.251086 env[1219]: time="2025-09-13T00:46:04.251074263Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:46:04.251305 env[1219]: time="2025-09-13T00:46:04.251129864Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:46:04.251305 env[1219]: time="2025-09-13T00:46:04.251184380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:46:04.251682 env[1219]: time="2025-09-13T00:46:04.251580545Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:46:04.259099 env[1219]: time="2025-09-13T00:46:04.251700646Z" level=info msg="Connect containerd service" Sep 13 00:46:04.259099 env[1219]: time="2025-09-13T00:46:04.251753646Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:46:04.267616 env[1219]: time="2025-09-13T00:46:04.267538519Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:46:04.267751 env[1219]: time="2025-09-13T00:46:04.267675938Z" level=info msg="Start subscribing containerd event" Sep 13 00:46:04.267826 env[1219]: time="2025-09-13T00:46:04.267761796Z" level=info msg="Start recovering state" Sep 13 00:46:04.267921 env[1219]: time="2025-09-13T00:46:04.267876921Z" level=info msg="Start event monitor" Sep 13 00:46:04.267980 env[1219]: time="2025-09-13T00:46:04.267936195Z" level=info msg="Start snapshots syncer" Sep 13 00:46:04.267980 env[1219]: time="2025-09-13T00:46:04.267955141Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:46:04.268068 env[1219]: time="2025-09-13T00:46:04.267986090Z" level=info msg="Start streaming server" Sep 13 00:46:04.280138 env[1219]: time="2025-09-13T00:46:04.280068919Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:46:04.280284 env[1219]: time="2025-09-13T00:46:04.280239111Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:46:04.280533 systemd[1]: Started containerd.service. Sep 13 00:46:04.342194 env[1219]: time="2025-09-13T00:46:04.342137823Z" level=info msg="containerd successfully booted in 0.333481s" Sep 13 00:46:04.423854 dbus-daemon[1191]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 13 00:46:04.424055 systemd[1]: Started systemd-hostnamed.service. Sep 13 00:46:04.424811 dbus-daemon[1191]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1249 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 13 00:46:04.437379 systemd[1]: Starting polkit.service... Sep 13 00:46:04.521564 polkitd[1268]: Started polkitd version 121 Sep 13 00:46:04.553206 polkitd[1268]: Loading rules from directory /etc/polkit-1/rules.d Sep 13 00:46:04.553575 polkitd[1268]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 13 00:46:04.561675 polkitd[1268]: Finished loading, compiling and executing 2 rules Sep 13 00:46:04.562545 dbus-daemon[1191]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 13 00:46:04.562778 systemd[1]: Started polkit.service. Sep 13 00:46:04.563677 polkitd[1268]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 13 00:46:04.605585 systemd-hostnamed[1249]: Hostname set to (transient) Sep 13 00:46:04.608302 systemd-resolved[1156]: System hostname changed to 'ci-3510-3-8-nightly-20250912-2100-06f444dd0ad3d7015747'. Sep 13 00:46:06.164529 systemd[1]: Started kubelet.service. Sep 13 00:46:06.700941 locksmithd[1245]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:46:07.485106 kubelet[1281]: E0913 00:46:07.485047 1281 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:46:07.488023 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:46:07.488240 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:46:07.488627 systemd[1]: kubelet.service: Consumed 1.596s CPU time. Sep 13 00:46:09.280317 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:46:09.323628 systemd[1]: Finished sshd-keygen.service. Sep 13 00:46:09.335420 systemd[1]: Starting issuegen.service... Sep 13 00:46:09.345962 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:46:09.346168 systemd[1]: Finished issuegen.service. Sep 13 00:46:09.356528 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:46:09.369873 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:46:09.381354 systemd[1]: Started getty@tty1.service. Sep 13 00:46:09.391016 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:46:09.400096 systemd[1]: Reached target getty.target. Sep 13 00:46:10.188967 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Sep 13 00:46:12.092515 kernel: loop2: detected capacity change from 0 to 2097152 Sep 13 00:46:12.108332 systemd-nspawn[1302]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Sep 13 00:46:12.108332 systemd-nspawn[1302]: Press ^] three times within 1s to kill container. Sep 13 00:46:12.125524 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:46:12.205842 systemd[1]: Started oem-gce.service. Sep 13 00:46:12.213121 systemd[1]: Reached target multi-user.target. Sep 13 00:46:12.223874 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:46:12.237167 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:46:12.237443 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:46:12.247818 systemd[1]: Startup finished in 1.051s (kernel) + 7.289s (initrd) + 16.580s (userspace) = 24.921s. Sep 13 00:46:12.258516 systemd-nspawn[1302]: + '[' -e /etc/default/instance_configs.cfg.template ']' Sep 13 00:46:12.258642 systemd-nspawn[1302]: + echo -e '[InstanceSetup]\nset_host_keys = false' Sep 13 00:46:12.258874 systemd-nspawn[1302]: + /usr/bin/google_instance_setup Sep 13 00:46:12.835371 instance-setup[1308]: INFO Running google_set_multiqueue. Sep 13 00:46:12.850881 instance-setup[1308]: INFO Set channels for eth0 to 2. Sep 13 00:46:12.854534 instance-setup[1308]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Sep 13 00:46:12.855946 instance-setup[1308]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Sep 13 00:46:12.856504 instance-setup[1308]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Sep 13 00:46:12.857697 instance-setup[1308]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Sep 13 00:46:12.858099 instance-setup[1308]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Sep 13 00:46:12.859502 instance-setup[1308]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Sep 13 00:46:12.859909 instance-setup[1308]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Sep 13 00:46:12.861270 instance-setup[1308]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Sep 13 00:46:12.872431 instance-setup[1308]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Sep 13 00:46:12.872626 instance-setup[1308]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Sep 13 00:46:12.915082 systemd-nspawn[1302]: + /usr/bin/google_metadata_script_runner --script-type startup Sep 13 00:46:13.246590 startup-script[1339]: INFO Starting startup scripts. Sep 13 00:46:13.259110 startup-script[1339]: INFO No startup scripts found in metadata. Sep 13 00:46:13.259290 startup-script[1339]: INFO Finished running startup scripts. Sep 13 00:46:13.294826 systemd-nspawn[1302]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Sep 13 00:46:13.294826 systemd-nspawn[1302]: + daemon_pids=() Sep 13 00:46:13.295550 systemd-nspawn[1302]: + for d in accounts clock_skew network Sep 13 00:46:13.295550 systemd-nspawn[1302]: + daemon_pids+=($!) Sep 13 00:46:13.295550 systemd-nspawn[1302]: + for d in accounts clock_skew network Sep 13 00:46:13.295838 systemd-nspawn[1302]: + daemon_pids+=($!) Sep 13 00:46:13.295985 systemd-nspawn[1302]: + for d in accounts clock_skew network Sep 13 00:46:13.296275 systemd-nspawn[1302]: + /usr/bin/google_accounts_daemon Sep 13 00:46:13.296397 systemd-nspawn[1302]: + daemon_pids+=($!) Sep 13 00:46:13.296513 systemd-nspawn[1302]: + NOTIFY_SOCKET=/run/systemd/notify Sep 13 00:46:13.296611 systemd-nspawn[1302]: + /usr/bin/systemd-notify --ready Sep 13 00:46:13.297249 systemd-nspawn[1302]: + /usr/bin/google_network_daemon Sep 13 00:46:13.297618 systemd-nspawn[1302]: + /usr/bin/google_clock_skew_daemon Sep 13 00:46:13.353204 systemd-nspawn[1302]: + wait -n 36 37 38 Sep 13 00:46:13.508401 systemd[1]: Created slice system-sshd.slice. Sep 13 00:46:13.512218 systemd[1]: Started sshd@0-10.128.0.96:22-139.178.68.195:40286.service. Sep 13 00:46:13.907980 sshd[1347]: Accepted publickey for core from 139.178.68.195 port 40286 ssh2: RSA SHA256:FcUh4BNE27e1kC0wUevabIQVoX+mPgnUAJiptYDOjtA Sep 13 00:46:13.911325 sshd[1347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:13.929495 systemd[1]: Created slice user-500.slice. Sep 13 00:46:13.934153 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:46:13.940600 systemd-logind[1228]: New session 1 of user core. Sep 13 00:46:13.953607 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:46:13.958158 systemd[1]: Starting user@500.service... Sep 13 00:46:13.982084 (systemd)[1356]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:14.065172 google-clock-skew[1343]: INFO Starting Google Clock Skew daemon. Sep 13 00:46:14.093951 google-clock-skew[1343]: INFO Clock drift token has changed: 0. Sep 13 00:46:14.107744 systemd-nspawn[1302]: hwclock: Cannot access the Hardware Clock via any known method. Sep 13 00:46:14.108019 systemd-nspawn[1302]: hwclock: Use the --verbose option to see the details of our search for an access method. Sep 13 00:46:14.109023 google-clock-skew[1343]: WARNING Failed to sync system time with hardware clock. Sep 13 00:46:14.176012 google-networking[1344]: INFO Starting Google Networking daemon. Sep 13 00:46:14.195622 groupadd[1363]: group added to /etc/group: name=google-sudoers, GID=1000 Sep 13 00:46:14.199198 groupadd[1363]: group added to /etc/gshadow: name=google-sudoers Sep 13 00:46:14.203050 systemd[1356]: Queued start job for default target default.target. Sep 13 00:46:14.204142 groupadd[1363]: new group: name=google-sudoers, GID=1000 Sep 13 00:46:14.204014 systemd[1356]: Reached target paths.target. Sep 13 00:46:14.204046 systemd[1356]: Reached target sockets.target. Sep 13 00:46:14.204072 systemd[1356]: Reached target timers.target. Sep 13 00:46:14.204095 systemd[1356]: Reached target basic.target. Sep 13 00:46:14.204167 systemd[1356]: Reached target default.target. Sep 13 00:46:14.204222 systemd[1356]: Startup finished in 204ms. Sep 13 00:46:14.204358 systemd[1]: Started user@500.service. Sep 13 00:46:14.206135 systemd[1]: Started session-1.scope. Sep 13 00:46:14.227810 google-accounts[1342]: INFO Starting Google Accounts daemon. Sep 13 00:46:14.252163 google-accounts[1342]: WARNING OS Login not installed. Sep 13 00:46:14.253093 google-accounts[1342]: INFO Creating a new user account for 0. Sep 13 00:46:14.258228 systemd-nspawn[1302]: useradd: invalid user name '0': use --badname to ignore Sep 13 00:46:14.259015 google-accounts[1342]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Sep 13 00:46:14.485510 systemd[1]: Started sshd@1-10.128.0.96:22-139.178.68.195:40298.service. Sep 13 00:46:14.860775 sshd[1377]: Accepted publickey for core from 139.178.68.195 port 40298 ssh2: RSA SHA256:FcUh4BNE27e1kC0wUevabIQVoX+mPgnUAJiptYDOjtA Sep 13 00:46:14.862855 sshd[1377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:14.869099 systemd-logind[1228]: New session 2 of user core. Sep 13 00:46:14.869890 systemd[1]: Started session-2.scope. Sep 13 00:46:15.134248 sshd[1377]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:15.139537 systemd[1]: sshd@1-10.128.0.96:22-139.178.68.195:40298.service: Deactivated successfully. Sep 13 00:46:15.140664 systemd[1]: session-2.scope: Deactivated successfully. Sep 13 00:46:15.141520 systemd-logind[1228]: Session 2 logged out. Waiting for processes to exit. Sep 13 00:46:15.142748 systemd-logind[1228]: Removed session 2. Sep 13 00:46:15.195052 systemd[1]: Started sshd@2-10.128.0.96:22-139.178.68.195:40304.service. Sep 13 00:46:15.571982 sshd[1383]: Accepted publickey for core from 139.178.68.195 port 40304 ssh2: RSA SHA256:FcUh4BNE27e1kC0wUevabIQVoX+mPgnUAJiptYDOjtA Sep 13 00:46:15.573943 sshd[1383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:15.579966 systemd-logind[1228]: New session 3 of user core. Sep 13 00:46:15.580728 systemd[1]: Started session-3.scope. Sep 13 00:46:15.841926 sshd[1383]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:15.846069 systemd[1]: sshd@2-10.128.0.96:22-139.178.68.195:40304.service: Deactivated successfully. Sep 13 00:46:15.847148 systemd[1]: session-3.scope: Deactivated successfully. Sep 13 00:46:15.848068 systemd-logind[1228]: Session 3 logged out. Waiting for processes to exit. Sep 13 00:46:15.849273 systemd-logind[1228]: Removed session 3. Sep 13 00:46:15.903532 systemd[1]: Started sshd@3-10.128.0.96:22-139.178.68.195:40314.service. Sep 13 00:46:16.283025 sshd[1389]: Accepted publickey for core from 139.178.68.195 port 40314 ssh2: RSA SHA256:FcUh4BNE27e1kC0wUevabIQVoX+mPgnUAJiptYDOjtA Sep 13 00:46:16.285155 sshd[1389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:16.291882 systemd[1]: Started session-4.scope. Sep 13 00:46:16.292709 systemd-logind[1228]: New session 4 of user core. Sep 13 00:46:16.559097 sshd[1389]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:16.563574 systemd[1]: sshd@3-10.128.0.96:22-139.178.68.195:40314.service: Deactivated successfully. Sep 13 00:46:16.564647 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:46:16.565536 systemd-logind[1228]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:46:16.566880 systemd-logind[1228]: Removed session 4. Sep 13 00:46:17.697297 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:46:17.697647 systemd[1]: Stopped kubelet.service. Sep 13 00:46:17.697736 systemd[1]: kubelet.service: Consumed 1.596s CPU time. Sep 13 00:46:17.699907 systemd[1]: Starting kubelet.service... Sep 13 00:46:18.014711 systemd[1]: Started kubelet.service. Sep 13 00:46:18.067826 kubelet[1398]: E0913 00:46:18.067731 1398 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:46:18.071827 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:46:18.072058 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:46:21.622169 systemd[1]: Started sshd@4-10.128.0.96:22-139.178.68.195:59370.service. Sep 13 00:46:22.005808 sshd[1406]: Accepted publickey for core from 139.178.68.195 port 59370 ssh2: RSA SHA256:FcUh4BNE27e1kC0wUevabIQVoX+mPgnUAJiptYDOjtA Sep 13 00:46:22.008209 sshd[1406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:22.015734 systemd[1]: Started session-5.scope. Sep 13 00:46:22.016378 systemd-logind[1228]: New session 5 of user core. Sep 13 00:46:22.248844 sudo[1409]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:46:22.249323 sudo[1409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:22.259756 dbus-daemon[1191]: \xd0-\xef\u001e\xddU: received setenforce notice (enforcing=1062106416) Sep 13 00:46:22.262556 sudo[1409]: pam_unix(sudo:session): session closed for user root Sep 13 00:46:22.322541 sshd[1406]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:22.328007 systemd[1]: sshd@4-10.128.0.96:22-139.178.68.195:59370.service: Deactivated successfully. Sep 13 00:46:22.329373 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:46:22.330588 systemd-logind[1228]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:46:22.332582 systemd-logind[1228]: Removed session 5. Sep 13 00:46:22.384030 systemd[1]: Started sshd@5-10.128.0.96:22-139.178.68.195:59378.service. Sep 13 00:46:22.762886 sshd[1413]: Accepted publickey for core from 139.178.68.195 port 59378 ssh2: RSA SHA256:FcUh4BNE27e1kC0wUevabIQVoX+mPgnUAJiptYDOjtA Sep 13 00:46:22.765238 sshd[1413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:22.772178 systemd-logind[1228]: New session 6 of user core. Sep 13 00:46:22.773141 systemd[1]: Started session-6.scope. Sep 13 00:46:22.987344 sudo[1417]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:46:22.987839 sudo[1417]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:22.992921 sudo[1417]: pam_unix(sudo:session): session closed for user root Sep 13 00:46:23.007046 sudo[1416]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:46:23.007507 sudo[1416]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:23.021601 systemd[1]: Stopping audit-rules.service... Sep 13 00:46:23.022000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:46:23.025916 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:46:23.028570 auditctl[1420]: No rules Sep 13 00:46:23.026188 systemd[1]: Stopped audit-rules.service. Sep 13 00:46:23.036386 kernel: kauditd_printk_skb: 208 callbacks suppressed Sep 13 00:46:23.036509 kernel: audit: type=1305 audit(1757724383.022:188): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:46:23.034591 systemd[1]: Starting audit-rules.service... Sep 13 00:46:23.070560 kernel: audit: type=1300 audit(1757724383.022:188): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff2b2d320 a2=420 a3=0 items=0 ppid=1 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:23.022000 audit[1420]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff2b2d320 a2=420 a3=0 items=0 ppid=1 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:23.072684 augenrules[1437]: No rules Sep 13 00:46:23.074239 systemd[1]: Finished audit-rules.service. Sep 13 00:46:23.078763 kernel: audit: type=1327 audit(1757724383.022:188): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:46:23.022000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:46:23.076787 sudo[1416]: pam_unix(sudo:session): session closed for user root Sep 13 00:46:23.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.107788 kernel: audit: type=1131 audit(1757724383.022:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.129600 kernel: audit: type=1130 audit(1757724383.073:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.129724 kernel: audit: type=1106 audit(1757724383.075:191): pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.075000 audit[1416]: USER_END pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.137830 sshd[1413]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:23.144484 systemd-logind[1228]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:46:23.147108 systemd[1]: sshd@5-10.128.0.96:22-139.178.68.195:59378.service: Deactivated successfully. Sep 13 00:46:23.148432 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:46:23.150736 systemd-logind[1228]: Removed session 6. Sep 13 00:46:23.075000 audit[1416]: CRED_DISP pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.177519 kernel: audit: type=1104 audit(1757724383.075:192): pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.177679 kernel: audit: type=1106 audit(1757724383.139:193): pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.139000 audit[1413]: USER_END pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.234302 kernel: audit: type=1104 audit(1757724383.139:194): pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.139000 audit[1413]: CRED_DISP pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.219606 systemd[1]: Started sshd@6-10.128.0.96:22-139.178.68.195:59394.service. Sep 13 00:46:23.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.96:22-139.178.68.195:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.96:22-139.178.68.195:59394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.260543 kernel: audit: type=1131 audit(1757724383.145:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.96:22-139.178.68.195:59378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.602000 audit[1443]: USER_ACCT pid=1443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.604213 sshd[1443]: Accepted publickey for core from 139.178.68.195 port 59394 ssh2: RSA SHA256:FcUh4BNE27e1kC0wUevabIQVoX+mPgnUAJiptYDOjtA Sep 13 00:46:23.604000 audit[1443]: CRED_ACQ pid=1443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.604000 audit[1443]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffffe7ea10 a2=3 a3=0 items=0 ppid=1 pid=1443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:23.604000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:46:23.606262 sshd[1443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:23.613231 systemd[1]: Started session-7.scope. Sep 13 00:46:23.614033 systemd-logind[1228]: New session 7 of user core. Sep 13 00:46:23.620000 audit[1443]: USER_START pid=1443 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.622000 audit[1445]: CRED_ACQ pid=1445 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:23.824000 audit[1446]: USER_ACCT pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.826184 sudo[1446]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:46:23.824000 audit[1446]: CRED_REFR pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.826647 sudo[1446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:23.827000 audit[1446]: USER_START pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:23.845771 systemd[1]: Starting coreos-metadata.service... Sep 13 00:46:23.895845 coreos-metadata[1450]: Sep 13 00:46:23.895 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Sep 13 00:46:23.896985 coreos-metadata[1450]: Sep 13 00:46:23.896 INFO Fetch successful Sep 13 00:46:23.897101 coreos-metadata[1450]: Sep 13 00:46:23.896 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Sep 13 00:46:23.897349 coreos-metadata[1450]: Sep 13 00:46:23.897 INFO Fetch successful Sep 13 00:46:23.897442 coreos-metadata[1450]: Sep 13 00:46:23.897 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Sep 13 00:46:23.897909 coreos-metadata[1450]: Sep 13 00:46:23.897 INFO Fetch successful Sep 13 00:46:23.898001 coreos-metadata[1450]: Sep 13 00:46:23.897 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Sep 13 00:46:23.898434 coreos-metadata[1450]: Sep 13 00:46:23.898 INFO Fetch successful Sep 13 00:46:23.909628 systemd[1]: Finished coreos-metadata.service. Sep 13 00:46:23.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:24.689535 systemd[1]: Stopped kubelet.service. Sep 13 00:46:24.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:24.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:24.693245 systemd[1]: Starting kubelet.service... Sep 13 00:46:24.734764 systemd[1]: Reloading. Sep 13 00:46:24.876727 /usr/lib/systemd/system-generators/torcx-generator[1502]: time="2025-09-13T00:46:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:46:24.876776 /usr/lib/systemd/system-generators/torcx-generator[1502]: time="2025-09-13T00:46:24Z" level=info msg="torcx already run" Sep 13 00:46:25.025031 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:46:25.025062 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:46:25.049495 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.142000 audit: BPF prog-id=43 op=LOAD Sep 13 00:46:25.142000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.143000 audit: BPF prog-id=44 op=LOAD Sep 13 00:46:25.143000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:46:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.145000 audit: BPF prog-id=45 op=LOAD Sep 13 00:46:25.145000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.148000 audit: BPF prog-id=46 op=LOAD Sep 13 00:46:25.148000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:46:25.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit: BPF prog-id=47 op=LOAD Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.149000 audit: BPF prog-id=48 op=LOAD Sep 13 00:46:25.149000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:46:25.149000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit: BPF prog-id=49 op=LOAD Sep 13 00:46:25.152000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit: BPF prog-id=50 op=LOAD Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.152000 audit: BPF prog-id=51 op=LOAD Sep 13 00:46:25.152000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:46:25.152000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:46:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit: BPF prog-id=52 op=LOAD Sep 13 00:46:25.173000 audit: BPF prog-id=39 op=UNLOAD Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit: BPF prog-id=53 op=LOAD Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.173000 audit: BPF prog-id=54 op=LOAD Sep 13 00:46:25.173000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:46:25.173000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit: BPF prog-id=55 op=LOAD Sep 13 00:46:25.175000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.175000 audit: BPF prog-id=56 op=LOAD Sep 13 00:46:25.176000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit: BPF prog-id=57 op=LOAD Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.176000 audit: BPF prog-id=58 op=LOAD Sep 13 00:46:25.176000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:46:25.176000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit: BPF prog-id=59 op=LOAD Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:25.177000 audit: BPF prog-id=60 op=LOAD Sep 13 00:46:25.177000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:46:25.177000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:46:25.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:25.201026 systemd[1]: Started kubelet.service. Sep 13 00:46:25.211007 systemd[1]: Stopping kubelet.service... Sep 13 00:46:25.212168 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:46:25.212432 systemd[1]: Stopped kubelet.service. Sep 13 00:46:25.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:25.214807 systemd[1]: Starting kubelet.service... Sep 13 00:46:25.523187 systemd[1]: Started kubelet.service. Sep 13 00:46:25.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:25.582032 kubelet[1558]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:46:25.582032 kubelet[1558]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 13 00:46:25.582032 kubelet[1558]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:46:25.582640 kubelet[1558]: I0913 00:46:25.582159 1558 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:46:26.160673 kubelet[1558]: I0913 00:46:26.160610 1558 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 13 00:46:26.160673 kubelet[1558]: I0913 00:46:26.160652 1558 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:46:26.161103 kubelet[1558]: I0913 00:46:26.161055 1558 server.go:934] "Client rotation is on, will bootstrap in background" Sep 13 00:46:26.204379 kubelet[1558]: I0913 00:46:26.204314 1558 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:46:26.215331 kubelet[1558]: E0913 00:46:26.215270 1558 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:46:26.215331 kubelet[1558]: I0913 00:46:26.215308 1558 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:46:26.229883 kubelet[1558]: I0913 00:46:26.229817 1558 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:46:26.230093 kubelet[1558]: I0913 00:46:26.229993 1558 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 13 00:46:26.230462 kubelet[1558]: I0913 00:46:26.230227 1558 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:46:26.230768 kubelet[1558]: I0913 00:46:26.230465 1558 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.96","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:46:26.230971 kubelet[1558]: I0913 00:46:26.230792 1558 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:46:26.230971 kubelet[1558]: I0913 00:46:26.230820 1558 container_manager_linux.go:300] "Creating device plugin manager" Sep 13 00:46:26.231096 kubelet[1558]: I0913 00:46:26.230984 1558 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:46:26.235636 kubelet[1558]: I0913 00:46:26.235596 1558 kubelet.go:408] "Attempting to sync node with API server" Sep 13 00:46:26.235636 kubelet[1558]: I0913 00:46:26.235634 1558 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:46:26.235786 kubelet[1558]: I0913 00:46:26.235709 1558 kubelet.go:314] "Adding apiserver pod source" Sep 13 00:46:26.235924 kubelet[1558]: E0913 00:46:26.235800 1558 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:26.235924 kubelet[1558]: E0913 00:46:26.235861 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:26.235924 kubelet[1558]: I0913 00:46:26.235899 1558 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:46:26.239978 kubelet[1558]: I0913 00:46:26.239947 1558 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:46:26.240686 kubelet[1558]: I0913 00:46:26.240652 1558 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:46:26.240779 kubelet[1558]: W0913 00:46:26.240741 1558 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:46:26.254969 kubelet[1558]: I0913 00:46:26.254922 1558 server.go:1274] "Started kubelet" Sep 13 00:46:26.271491 kubelet[1558]: I0913 00:46:26.271406 1558 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:46:26.273100 kubelet[1558]: I0913 00:46:26.272986 1558 server.go:449] "Adding debug handlers to kubelet server" Sep 13 00:46:26.275029 kubelet[1558]: I0913 00:46:26.274977 1558 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:46:26.275528 kubelet[1558]: I0913 00:46:26.275501 1558 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:46:26.275000 audit[1558]: AVC avc: denied { mac_admin } for pid=1558 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:26.275000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:46:26.275000 audit[1558]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008224b0 a1=c000a397d0 a2=c000822480 a3=25 items=0 ppid=1 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.275000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:46:26.275000 audit[1558]: AVC avc: denied { mac_admin } for pid=1558 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:26.275000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:46:26.275000 audit[1558]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b60980 a1=c000a397e8 a2=c000822540 a3=25 items=0 ppid=1 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.275000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:46:26.278072 kubelet[1558]: I0913 00:46:26.276789 1558 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:46:26.278072 kubelet[1558]: I0913 00:46:26.276868 1558 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 13 00:46:26.278072 kubelet[1558]: I0913 00:46:26.276957 1558 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:46:26.282409 kubelet[1558]: I0913 00:46:26.281921 1558 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:46:26.287108 kubelet[1558]: E0913 00:46:26.286016 1558 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.128.0.96\" not found" Sep 13 00:46:26.287108 kubelet[1558]: I0913 00:46:26.286073 1558 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 13 00:46:26.287108 kubelet[1558]: I0913 00:46:26.286330 1558 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 13 00:46:26.287108 kubelet[1558]: I0913 00:46:26.286430 1558 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:46:26.288015 kubelet[1558]: I0913 00:46:26.287571 1558 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:46:26.297493 kubelet[1558]: E0913 00:46:26.295814 1558 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:46:26.297493 kubelet[1558]: I0913 00:46:26.297339 1558 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:46:26.297493 kubelet[1558]: I0913 00:46:26.297358 1558 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:46:26.316978 kubelet[1558]: E0913 00:46:26.316915 1558 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.96\" not found" node="10.128.0.96" Sep 13 00:46:26.323065 kubelet[1558]: I0913 00:46:26.323017 1558 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 13 00:46:26.323065 kubelet[1558]: I0913 00:46:26.323037 1558 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 13 00:46:26.323065 kubelet[1558]: I0913 00:46:26.323063 1558 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:46:26.328168 kubelet[1558]: I0913 00:46:26.328141 1558 policy_none.go:49] "None policy: Start" Sep 13 00:46:26.329408 kubelet[1558]: I0913 00:46:26.329381 1558 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 13 00:46:26.329617 kubelet[1558]: I0913 00:46:26.329601 1558 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:46:26.340226 systemd[1]: Created slice kubepods.slice. Sep 13 00:46:26.351246 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:46:26.356437 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:46:26.355000 audit[1574]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.355000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1bdafe10 a2=0 a3=7fff1bdafdfc items=0 ppid=1558 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:46:26.359000 audit[1578]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.359000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff31f5b7e0 a2=0 a3=7fff31f5b7cc items=0 ppid=1558 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:46:26.365734 kubelet[1558]: I0913 00:46:26.365693 1558 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:46:26.364000 audit[1558]: AVC avc: denied { mac_admin } for pid=1558 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:26.364000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:46:26.364000 audit[1558]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ccbe00 a1=c000da4030 a2=c000ccbdd0 a3=25 items=0 ppid=1 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:46:26.366171 kubelet[1558]: I0913 00:46:26.365783 1558 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:46:26.366171 kubelet[1558]: I0913 00:46:26.365953 1558 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:46:26.366171 kubelet[1558]: I0913 00:46:26.365969 1558 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:46:26.368694 kubelet[1558]: I0913 00:46:26.366916 1558 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:46:26.371745 kubelet[1558]: E0913 00:46:26.371700 1558 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.96\" not found" Sep 13 00:46:26.369000 audit[1580]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.369000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc41af82c0 a2=0 a3=7ffc41af82ac items=0 ppid=1558 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:46:26.391000 audit[1585]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.391000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffeb3fd400 a2=0 a3=7fffeb3fd3ec items=0 ppid=1558 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:46:26.451000 audit[1590]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.451000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe060e04c0 a2=0 a3=7ffe060e04ac items=0 ppid=1558 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:46:26.453494 kubelet[1558]: I0913 00:46:26.453400 1558 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:46:26.454000 audit[1591]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.454000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc738c5040 a2=0 a3=7ffc738c502c items=0 ppid=1558 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.454000 audit[1592]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:26.454000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5d266b20 a2=0 a3=7ffd5d266b0c items=0 ppid=1558 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:46:26.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:46:26.456255 kubelet[1558]: I0913 00:46:26.456216 1558 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:46:26.456339 kubelet[1558]: I0913 00:46:26.456265 1558 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 13 00:46:26.456339 kubelet[1558]: I0913 00:46:26.456296 1558 kubelet.go:2321] "Starting kubelet main sync loop" Sep 13 00:46:26.456429 kubelet[1558]: E0913 00:46:26.456359 1558 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 00:46:26.457000 audit[1593]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1593 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:26.457000 audit[1593]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd46f36180 a2=0 a3=7ffd46f3616c items=0 ppid=1558 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:46:26.459000 audit[1594]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.459000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc59658930 a2=0 a3=7ffc5965891c items=0 ppid=1558 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:46:26.460000 audit[1596]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1596 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:26.460000 audit[1596]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdda79ce90 a2=0 a3=7ffdda79ce7c items=0 ppid=1558 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:46:26.461000 audit[1595]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1595 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:26.461000 audit[1595]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe0ace2b70 a2=0 a3=7ffe0ace2b5c items=0 ppid=1558 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:46:26.463000 audit[1597]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1597 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:26.463000 audit[1597]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce35e35f0 a2=0 a3=7ffce35e35dc items=0 ppid=1558 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:46:26.466932 kubelet[1558]: I0913 00:46:26.466904 1558 kubelet_node_status.go:72] "Attempting to register node" node="10.128.0.96" Sep 13 00:46:26.472587 kubelet[1558]: I0913 00:46:26.472538 1558 kubelet_node_status.go:75] "Successfully registered node" node="10.128.0.96" Sep 13 00:46:26.489518 kubelet[1558]: I0913 00:46:26.489486 1558 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 00:46:26.490175 env[1219]: time="2025-09-13T00:46:26.490110802Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:46:26.490727 kubelet[1558]: I0913 00:46:26.490358 1558 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 00:46:26.574351 sudo[1446]: pam_unix(sudo:session): session closed for user root Sep 13 00:46:26.572000 audit[1446]: USER_END pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.573000 audit[1446]: CRED_DISP pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.631865 sshd[1443]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:26.632000 audit[1443]: USER_END pid=1443 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:26.632000 audit[1443]: CRED_DISP pid=1443 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Sep 13 00:46:26.636989 systemd[1]: sshd@6-10.128.0.96:22-139.178.68.195:59394.service: Deactivated successfully. Sep 13 00:46:26.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.96:22-139.178.68.195:59394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.638211 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:46:26.639197 systemd-logind[1228]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:46:26.640754 systemd-logind[1228]: Removed session 7. Sep 13 00:46:27.163654 kubelet[1558]: I0913 00:46:27.163585 1558 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 00:46:27.164236 kubelet[1558]: W0913 00:46:27.163824 1558 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:46:27.164236 kubelet[1558]: W0913 00:46:27.164175 1558 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:46:27.164236 kubelet[1558]: W0913 00:46:27.164216 1558 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:46:27.236921 kubelet[1558]: I0913 00:46:27.236862 1558 apiserver.go:52] "Watching apiserver" Sep 13 00:46:27.237141 kubelet[1558]: E0913 00:46:27.236865 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:27.243587 kubelet[1558]: E0913 00:46:27.243424 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:46:27.258255 systemd[1]: Created slice kubepods-besteffort-podaf052410_678f_43e6_a751_54754c8e7cd0.slice. Sep 13 00:46:27.273327 systemd[1]: Created slice kubepods-besteffort-podeefef202_d929_4cac_b259_c454ae681542.slice. Sep 13 00:46:27.287056 kubelet[1558]: I0913 00:46:27.287018 1558 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 13 00:46:27.290831 kubelet[1558]: I0913 00:46:27.290769 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-var-lib-calico\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.290955 kubelet[1558]: I0913 00:46:27.290855 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8878325d-ae4e-4d2c-a09b-f5dc650071a3-kubelet-dir\") pod \"csi-node-driver-9tsxc\" (UID: \"8878325d-ae4e-4d2c-a09b-f5dc650071a3\") " pod="calico-system/csi-node-driver-9tsxc" Sep 13 00:46:27.290955 kubelet[1558]: I0913 00:46:27.290912 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eefef202-d929-4cac-b259-c454ae681542-xtables-lock\") pod \"kube-proxy-tpnvt\" (UID: \"eefef202-d929-4cac-b259-c454ae681542\") " pod="kube-system/kube-proxy-tpnvt" Sep 13 00:46:27.291064 kubelet[1558]: I0913 00:46:27.290940 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eefef202-d929-4cac-b259-c454ae681542-lib-modules\") pod \"kube-proxy-tpnvt\" (UID: \"eefef202-d929-4cac-b259-c454ae681542\") " pod="kube-system/kube-proxy-tpnvt" Sep 13 00:46:27.291064 kubelet[1558]: I0913 00:46:27.290994 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-cni-net-dir\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291064 kubelet[1558]: I0913 00:46:27.291022 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-lib-modules\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291236 kubelet[1558]: I0913 00:46:27.291097 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-policysync\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291236 kubelet[1558]: I0913 00:46:27.291150 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bwvxq\" (UniqueName: \"kubernetes.io/projected/8878325d-ae4e-4d2c-a09b-f5dc650071a3-kube-api-access-bwvxq\") pod \"csi-node-driver-9tsxc\" (UID: \"8878325d-ae4e-4d2c-a09b-f5dc650071a3\") " pod="calico-system/csi-node-driver-9tsxc" Sep 13 00:46:27.291236 kubelet[1558]: I0913 00:46:27.291185 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-cni-log-dir\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291236 kubelet[1558]: I0913 00:46:27.291231 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zrfrl\" (UniqueName: \"kubernetes.io/projected/eefef202-d929-4cac-b259-c454ae681542-kube-api-access-zrfrl\") pod \"kube-proxy-tpnvt\" (UID: \"eefef202-d929-4cac-b259-c454ae681542\") " pod="kube-system/kube-proxy-tpnvt" Sep 13 00:46:27.291434 kubelet[1558]: I0913 00:46:27.291262 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8878325d-ae4e-4d2c-a09b-f5dc650071a3-varrun\") pod \"csi-node-driver-9tsxc\" (UID: \"8878325d-ae4e-4d2c-a09b-f5dc650071a3\") " pod="calico-system/csi-node-driver-9tsxc" Sep 13 00:46:27.291434 kubelet[1558]: I0913 00:46:27.291309 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-flexvol-driver-host\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291434 kubelet[1558]: I0913 00:46:27.291366 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/af052410-678f-43e6-a751-54754c8e7cd0-node-certs\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291434 kubelet[1558]: I0913 00:46:27.291418 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/af052410-678f-43e6-a751-54754c8e7cd0-tigera-ca-bundle\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291665 kubelet[1558]: I0913 00:46:27.291493 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-var-run-calico\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291665 kubelet[1558]: I0913 00:46:27.291536 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-xtables-lock\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291665 kubelet[1558]: I0913 00:46:27.291585 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zfgrk\" (UniqueName: \"kubernetes.io/projected/af052410-678f-43e6-a751-54754c8e7cd0-kube-api-access-zfgrk\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291665 kubelet[1558]: I0913 00:46:27.291615 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8878325d-ae4e-4d2c-a09b-f5dc650071a3-registration-dir\") pod \"csi-node-driver-9tsxc\" (UID: \"8878325d-ae4e-4d2c-a09b-f5dc650071a3\") " pod="calico-system/csi-node-driver-9tsxc" Sep 13 00:46:27.291958 kubelet[1558]: I0913 00:46:27.291664 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/af052410-678f-43e6-a751-54754c8e7cd0-cni-bin-dir\") pod \"calico-node-tb946\" (UID: \"af052410-678f-43e6-a751-54754c8e7cd0\") " pod="calico-system/calico-node-tb946" Sep 13 00:46:27.291958 kubelet[1558]: I0913 00:46:27.291701 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/eefef202-d929-4cac-b259-c454ae681542-kube-proxy\") pod \"kube-proxy-tpnvt\" (UID: \"eefef202-d929-4cac-b259-c454ae681542\") " pod="kube-system/kube-proxy-tpnvt" Sep 13 00:46:27.291958 kubelet[1558]: I0913 00:46:27.291757 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8878325d-ae4e-4d2c-a09b-f5dc650071a3-socket-dir\") pod \"csi-node-driver-9tsxc\" (UID: \"8878325d-ae4e-4d2c-a09b-f5dc650071a3\") " pod="calico-system/csi-node-driver-9tsxc" Sep 13 00:46:27.394450 kubelet[1558]: I0913 00:46:27.394380 1558 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:46:27.396502 kubelet[1558]: E0913 00:46:27.396437 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.396747 kubelet[1558]: W0913 00:46:27.396718 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.396895 kubelet[1558]: E0913 00:46:27.396873 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.397395 kubelet[1558]: E0913 00:46:27.397372 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.397553 kubelet[1558]: W0913 00:46:27.397530 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.398020 kubelet[1558]: E0913 00:46:27.397983 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.398413 kubelet[1558]: E0913 00:46:27.398391 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.398558 kubelet[1558]: W0913 00:46:27.398535 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.398792 kubelet[1558]: E0913 00:46:27.398769 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.399167 kubelet[1558]: E0913 00:46:27.399145 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.399300 kubelet[1558]: W0913 00:46:27.399275 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.399532 kubelet[1558]: E0913 00:46:27.399507 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.399893 kubelet[1558]: E0913 00:46:27.399875 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.400026 kubelet[1558]: W0913 00:46:27.400006 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.400237 kubelet[1558]: E0913 00:46:27.400217 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.400621 kubelet[1558]: E0913 00:46:27.400602 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.400877 kubelet[1558]: W0913 00:46:27.400832 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.401232 kubelet[1558]: E0913 00:46:27.401208 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.401615 kubelet[1558]: E0913 00:46:27.401595 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.401744 kubelet[1558]: W0913 00:46:27.401722 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.401977 kubelet[1558]: E0913 00:46:27.401955 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.402308 kubelet[1558]: E0913 00:46:27.402289 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.402447 kubelet[1558]: W0913 00:46:27.402426 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.402747 kubelet[1558]: E0913 00:46:27.402726 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.403105 kubelet[1558]: E0913 00:46:27.403086 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.403224 kubelet[1558]: W0913 00:46:27.403204 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.403447 kubelet[1558]: E0913 00:46:27.403425 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.404348 kubelet[1558]: E0913 00:46:27.404326 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.404489 kubelet[1558]: W0913 00:46:27.404452 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.410377 kubelet[1558]: E0913 00:46:27.410344 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.410574 kubelet[1558]: W0913 00:46:27.410549 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.416136 kubelet[1558]: E0913 00:46:27.416039 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.416340 kubelet[1558]: E0913 00:46:27.416317 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.416552 kubelet[1558]: E0913 00:46:27.416531 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.416678 kubelet[1558]: W0913 00:46:27.416656 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.416936 kubelet[1558]: E0913 00:46:27.416903 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.417301 kubelet[1558]: E0913 00:46:27.417283 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.417416 kubelet[1558]: W0913 00:46:27.417396 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.417704 kubelet[1558]: E0913 00:46:27.417668 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.418062 kubelet[1558]: E0913 00:46:27.418042 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.418183 kubelet[1558]: W0913 00:46:27.418162 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.418392 kubelet[1558]: E0913 00:46:27.418374 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.418777 kubelet[1558]: E0913 00:46:27.418758 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.418893 kubelet[1558]: W0913 00:46:27.418876 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.419104 kubelet[1558]: E0913 00:46:27.419087 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.419410 kubelet[1558]: E0913 00:46:27.419395 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.419542 kubelet[1558]: W0913 00:46:27.419522 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.419898 kubelet[1558]: E0913 00:46:27.419728 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.420554 kubelet[1558]: E0913 00:46:27.420534 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.420774 kubelet[1558]: W0913 00:46:27.420753 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.421031 kubelet[1558]: E0913 00:46:27.421009 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.421877 kubelet[1558]: E0913 00:46:27.421858 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.422109 kubelet[1558]: W0913 00:46:27.422044 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.422349 kubelet[1558]: E0913 00:46:27.422328 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.423137 kubelet[1558]: E0913 00:46:27.423117 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.423267 kubelet[1558]: W0913 00:46:27.423247 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.423608 kubelet[1558]: E0913 00:46:27.423587 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.423966 kubelet[1558]: E0913 00:46:27.423948 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.424085 kubelet[1558]: W0913 00:46:27.424066 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.424210 kubelet[1558]: E0913 00:46:27.424190 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.435505 kubelet[1558]: E0913 00:46:27.429868 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.435505 kubelet[1558]: W0913 00:46:27.429894 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.435505 kubelet[1558]: E0913 00:46:27.429920 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.445360 kubelet[1558]: E0913 00:46:27.445323 1558 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:46:27.445360 kubelet[1558]: W0913 00:46:27.445352 1558 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:46:27.445600 kubelet[1558]: E0913 00:46:27.445383 1558 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:46:27.571606 env[1219]: time="2025-09-13T00:46:27.571549512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tb946,Uid:af052410-678f-43e6-a751-54754c8e7cd0,Namespace:calico-system,Attempt:0,}" Sep 13 00:46:27.577315 env[1219]: time="2025-09-13T00:46:27.577257247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tpnvt,Uid:eefef202-d929-4cac-b259-c454ae681542,Namespace:kube-system,Attempt:0,}" Sep 13 00:46:28.106033 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1478598097.mount: Deactivated successfully. Sep 13 00:46:28.114354 env[1219]: time="2025-09-13T00:46:28.114281929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.115680 env[1219]: time="2025-09-13T00:46:28.115619722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.119279 env[1219]: time="2025-09-13T00:46:28.119233540Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.120643 env[1219]: time="2025-09-13T00:46:28.120597286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.121654 env[1219]: time="2025-09-13T00:46:28.121616186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.124172 env[1219]: time="2025-09-13T00:46:28.124121191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.125116 env[1219]: time="2025-09-13T00:46:28.125077517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.129102 env[1219]: time="2025-09-13T00:46:28.129059319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:28.156027 env[1219]: time="2025-09-13T00:46:28.152727372Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:46:28.156027 env[1219]: time="2025-09-13T00:46:28.152791107Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:46:28.156027 env[1219]: time="2025-09-13T00:46:28.152810954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:46:28.156027 env[1219]: time="2025-09-13T00:46:28.153095583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b071f48a42db62aaf0b3a17c7067ab991b87a7be3dda57e5867ce4fc0458a82 pid=1634 runtime=io.containerd.runc.v2 Sep 13 00:46:28.156994 env[1219]: time="2025-09-13T00:46:28.156911224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:46:28.158252 env[1219]: time="2025-09-13T00:46:28.158207977Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:46:28.158458 env[1219]: time="2025-09-13T00:46:28.158415911Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:46:28.159311 env[1219]: time="2025-09-13T00:46:28.159249136Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa pid=1644 runtime=io.containerd.runc.v2 Sep 13 00:46:28.179487 systemd[1]: Started cri-containerd-7b071f48a42db62aaf0b3a17c7067ab991b87a7be3dda57e5867ce4fc0458a82.scope. Sep 13 00:46:28.186109 systemd[1]: Started cri-containerd-b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa.scope. Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.216756 kernel: kauditd_printk_skb: 276 callbacks suppressed Sep 13 00:46:28.216805 kernel: audit: type=1400 audit(1757724388.209:437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.257511 kernel: audit: type=1400 audit(1757724388.209:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.257767 kubelet[1558]: E0913 00:46:28.257710 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.278267 kernel: audit: type=1400 audit(1757724388.209:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.305831 kernel: audit: audit_backlog=66 > audit_backlog_limit=64 Sep 13 00:46:28.306004 kernel: audit: type=1400 audit(1757724388.209:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.306045 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.364343 kernel: audit: type=1400 audit(1757724388.209:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.364523 kernel: audit: backlog limit exceeded Sep 13 00:46:28.364585 kernel: audit: type=1400 audit(1757724388.209:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.364639 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.259000 audit: BPF prog-id=61 op=LOAD Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.276000 audit: BPF prog-id=62 op=LOAD Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1634 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303731663438613432646236326161663062336131376337303637 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1634 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303731663438613432646236326161663062336131376337303637 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit: BPF prog-id=63 op=LOAD Sep 13 00:46:28.277000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025bf20 items=0 ppid=1634 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303731663438613432646236326161663062336131376337303637 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit: BPF prog-id=64 op=LOAD Sep 13 00:46:28.277000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025bf68 items=0 ppid=1634 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303731663438613432646236326161663062336131376337303637 Sep 13 00:46:28.277000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:46:28.277000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:46:28.277000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1644 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326564623937383530386561366263653338613632313539393638 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1644 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326564623937383530386561366263653338613632313539393638 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.357000 audit: BPF prog-id=65 op=LOAD Sep 13 00:46:28.357000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000167fd0 items=0 ppid=1644 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326564623937383530386561366263653338613632313539393638 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit: BPF prog-id=66 op=LOAD Sep 13 00:46:28.363000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00022c018 items=0 ppid=1644 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326564623937383530386561366263653338613632313539393638 Sep 13 00:46:28.363000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:46:28.363000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.363000 audit: BPF prog-id=67 op=LOAD Sep 13 00:46:28.363000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00022c428 items=0 ppid=1644 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235326564623937383530386561366263653338613632313539393638 Sep 13 00:46:28.277000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:28.277000 audit: BPF prog-id=68 op=LOAD Sep 13 00:46:28.277000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c4378 items=0 ppid=1634 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303731663438613432646236326161663062336131376337303637 Sep 13 00:46:28.390639 env[1219]: time="2025-09-13T00:46:28.390561037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tb946,Uid:af052410-678f-43e6-a751-54754c8e7cd0,Namespace:calico-system,Attempt:0,} returns sandbox id \"b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa\"" Sep 13 00:46:28.394663 env[1219]: time="2025-09-13T00:46:28.394619412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:46:28.412535 env[1219]: time="2025-09-13T00:46:28.403747019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tpnvt,Uid:eefef202-d929-4cac-b259-c454ae681542,Namespace:kube-system,Attempt:0,} returns sandbox id \"7b071f48a42db62aaf0b3a17c7067ab991b87a7be3dda57e5867ce4fc0458a82\"" Sep 13 00:46:29.258543 kubelet[1558]: E0913 00:46:29.258493 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:29.294003 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1963197691.mount: Deactivated successfully. Sep 13 00:46:29.434887 env[1219]: time="2025-09-13T00:46:29.434817182Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:29.437394 env[1219]: time="2025-09-13T00:46:29.437335824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:29.439300 env[1219]: time="2025-09-13T00:46:29.439253603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:29.441149 env[1219]: time="2025-09-13T00:46:29.441101373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:29.441865 env[1219]: time="2025-09-13T00:46:29.441824997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:46:29.444887 env[1219]: time="2025-09-13T00:46:29.444264635Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\"" Sep 13 00:46:29.445390 env[1219]: time="2025-09-13T00:46:29.445336665Z" level=info msg="CreateContainer within sandbox \"b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:46:29.459466 kubelet[1558]: E0913 00:46:29.458948 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:46:29.464146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2173613428.mount: Deactivated successfully. Sep 13 00:46:29.471638 env[1219]: time="2025-09-13T00:46:29.471580247Z" level=info msg="CreateContainer within sandbox \"b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21\"" Sep 13 00:46:29.472437 env[1219]: time="2025-09-13T00:46:29.472364259Z" level=info msg="StartContainer for \"d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21\"" Sep 13 00:46:29.508521 systemd[1]: run-containerd-runc-k8s.io-d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21-runc.P4bXue.mount: Deactivated successfully. Sep 13 00:46:29.515112 systemd[1]: Started cri-containerd-d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21.scope. Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc85ad022f8 items=0 ppid=1644 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:29.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616263363364373639383038656134326436623035313730383161 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit: BPF prog-id=69 op=LOAD Sep 13 00:46:29.537000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024708 items=0 ppid=1644 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:29.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616263363364373639383038656134326436623035313730383161 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit: BPF prog-id=70 op=LOAD Sep 13 00:46:29.537000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024758 items=0 ppid=1644 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:29.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616263363364373639383038656134326436623035313730383161 Sep 13 00:46:29.537000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:46:29.537000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:29.537000 audit: BPF prog-id=71 op=LOAD Sep 13 00:46:29.537000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000247e8 items=0 ppid=1644 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:29.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431616263363364373639383038656134326436623035313730383161 Sep 13 00:46:29.567322 env[1219]: time="2025-09-13T00:46:29.567208409Z" level=info msg="StartContainer for \"d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21\" returns successfully" Sep 13 00:46:29.575022 systemd[1]: cri-containerd-d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21.scope: Deactivated successfully. Sep 13 00:46:29.577000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:46:29.652791 env[1219]: time="2025-09-13T00:46:29.652722596Z" level=info msg="shim disconnected" id=d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21 Sep 13 00:46:29.653071 env[1219]: time="2025-09-13T00:46:29.652788312Z" level=warning msg="cleaning up after shim disconnected" id=d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21 namespace=k8s.io Sep 13 00:46:29.653071 env[1219]: time="2025-09-13T00:46:29.652815272Z" level=info msg="cleaning up dead shim" Sep 13 00:46:29.664667 env[1219]: time="2025-09-13T00:46:29.664611713Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:46:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1757 runtime=io.containerd.runc.v2\n" Sep 13 00:46:30.259020 kubelet[1558]: E0913 00:46:30.258954 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:30.463819 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d1abc63d769808ea42d6b0517081a2adb1faf7f3e38d51ca012679c0bee5bc21-rootfs.mount: Deactivated successfully. Sep 13 00:46:30.646003 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount529787612.mount: Deactivated successfully. Sep 13 00:46:31.259389 kubelet[1558]: E0913 00:46:31.259295 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:31.417585 env[1219]: time="2025-09-13T00:46:31.417507559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:31.419913 env[1219]: time="2025-09-13T00:46:31.419860956Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:31.422158 env[1219]: time="2025-09-13T00:46:31.422109722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:31.423862 env[1219]: time="2025-09-13T00:46:31.423822492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:31.424536 env[1219]: time="2025-09-13T00:46:31.424492893Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\" returns image reference \"sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7\"" Sep 13 00:46:31.427067 env[1219]: time="2025-09-13T00:46:31.426409621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:46:31.428281 env[1219]: time="2025-09-13T00:46:31.428230830Z" level=info msg="CreateContainer within sandbox \"7b071f48a42db62aaf0b3a17c7067ab991b87a7be3dda57e5867ce4fc0458a82\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:46:31.444892 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2606142176.mount: Deactivated successfully. Sep 13 00:46:31.453755 env[1219]: time="2025-09-13T00:46:31.453675681Z" level=info msg="CreateContainer within sandbox \"7b071f48a42db62aaf0b3a17c7067ab991b87a7be3dda57e5867ce4fc0458a82\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"75ac49070534e6b116a1ea96d3e6a9e46c874a51c2dac73c12777e92593bdda1\"" Sep 13 00:46:31.454696 env[1219]: time="2025-09-13T00:46:31.454627162Z" level=info msg="StartContainer for \"75ac49070534e6b116a1ea96d3e6a9e46c874a51c2dac73c12777e92593bdda1\"" Sep 13 00:46:31.457734 kubelet[1558]: E0913 00:46:31.457627 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:46:31.493561 systemd[1]: Started cri-containerd-75ac49070534e6b116a1ea96d3e6a9e46c874a51c2dac73c12777e92593bdda1.scope. Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7758f9d368 items=0 ppid=1634 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616334393037303533346536623131366131656139366433653661 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit: BPF prog-id=72 op=LOAD Sep 13 00:46:31.513000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000265ba8 items=0 ppid=1634 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616334393037303533346536623131366131656139366433653661 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit: BPF prog-id=73 op=LOAD Sep 13 00:46:31.513000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000265bf8 items=0 ppid=1634 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616334393037303533346536623131366131656139366433653661 Sep 13 00:46:31.513000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:46:31.513000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:31.513000 audit: BPF prog-id=74 op=LOAD Sep 13 00:46:31.513000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000265c88 items=0 ppid=1634 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616334393037303533346536623131366131656139366433653661 Sep 13 00:46:31.537067 env[1219]: time="2025-09-13T00:46:31.535677625Z" level=info msg="StartContainer for \"75ac49070534e6b116a1ea96d3e6a9e46c874a51c2dac73c12777e92593bdda1\" returns successfully" Sep 13 00:46:31.689000 audit[1846]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.689000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8ff4d450 a2=0 a3=7ffe8ff4d43c items=0 ppid=1795 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:46:31.692000 audit[1847]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.692000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff37fe9980 a2=0 a3=7fff37fe996c items=0 ppid=1795 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:46:31.694000 audit[1845]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.694000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff734bf460 a2=0 a3=7fff734bf44c items=0 ppid=1795 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:46:31.695000 audit[1848]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.695000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0e7f16d0 a2=0 a3=7ffc0e7f16bc items=0 ppid=1795 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:46:31.696000 audit[1849]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.696000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf35751e0 a2=0 a3=7ffcf35751cc items=0 ppid=1795 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:46:31.699000 audit[1850]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.699000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9eeb87a0 a2=0 a3=7ffc9eeb878c items=0 ppid=1795 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:46:31.792000 audit[1851]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.792000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdf5054550 a2=0 a3=7ffdf505453c items=0 ppid=1795 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:46:31.798000 audit[1853]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.798000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc539b5a00 a2=0 a3=7ffc539b59ec items=0 ppid=1795 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:46:31.804000 audit[1856]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.804000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2a4b8a40 a2=0 a3=7ffe2a4b8a2c items=0 ppid=1795 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:46:31.806000 audit[1857]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.806000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed22635b0 a2=0 a3=7ffed226359c items=0 ppid=1795 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:46:31.809000 audit[1859]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.809000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec5cb4b60 a2=0 a3=7ffec5cb4b4c items=0 ppid=1795 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:46:31.811000 audit[1860]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.811000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4421e170 a2=0 a3=7ffc4421e15c items=0 ppid=1795 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:46:31.815000 audit[1862]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.815000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd8b3f150 a2=0 a3=7fffd8b3f13c items=0 ppid=1795 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:46:31.820000 audit[1865]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.820000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd132a95f0 a2=0 a3=7ffd132a95dc items=0 ppid=1795 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:46:31.821000 audit[1866]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.821000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfb4b55b0 a2=0 a3=7ffdfb4b559c items=0 ppid=1795 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:46:31.825000 audit[1868]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.825000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc3116080 a2=0 a3=7ffdc311606c items=0 ppid=1795 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:46:31.827000 audit[1869]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.827000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd053b970 a2=0 a3=7ffdd053b95c items=0 ppid=1795 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:46:31.830000 audit[1871]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.830000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9d6540c0 a2=0 a3=7ffe9d6540ac items=0 ppid=1795 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:46:31.835000 audit[1874]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.835000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5b298a80 a2=0 a3=7ffc5b298a6c items=0 ppid=1795 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:46:31.841000 audit[1877]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.841000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6d93f200 a2=0 a3=7fff6d93f1ec items=0 ppid=1795 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:46:31.843000 audit[1878]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.843000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf7257cb0 a2=0 a3=7ffdf7257c9c items=0 ppid=1795 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:46:31.846000 audit[1880]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.846000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc7d7d1ba0 a2=0 a3=7ffc7d7d1b8c items=0 ppid=1795 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:46:31.880000 audit[1884]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.880000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe2a324830 a2=0 a3=7ffe2a32481c items=0 ppid=1795 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:46:31.882000 audit[1885]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.882000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe74935690 a2=0 a3=7ffe7493567c items=0 ppid=1795 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:46:31.885000 audit[1887]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:31.885000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd80256f70 a2=0 a3=7ffd80256f5c items=0 ppid=1795 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:46:31.909000 audit[1893]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:46:31.909000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc65703ec0 a2=0 a3=7ffc65703eac items=0 ppid=1795 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:46:31.942000 audit[1893]: NETFILTER_CFG table=nat:40 family=2 entries=75 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:46:31.942000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=36204 a0=3 a1=7ffc65703ec0 a2=0 a3=7ffc65703eac items=0 ppid=1795 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:46:31.963000 audit[1902]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.963000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffddc2a61a0 a2=0 a3=7ffddc2a618c items=0 ppid=1795 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:46:31.967000 audit[1904]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.967000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc6756c80 a2=0 a3=7ffcc6756c6c items=0 ppid=1795 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:46:31.973000 audit[1907]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.973000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9b222970 a2=0 a3=7ffd9b22295c items=0 ppid=1795 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:46:31.975000 audit[1908]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.975000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0f7c24b0 a2=0 a3=7ffd0f7c249c items=0 ppid=1795 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.975000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:46:31.980000 audit[1910]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.980000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4b1bfae0 a2=0 a3=7ffe4b1bfacc items=0 ppid=1795 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:46:31.981000 audit[1911]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.981000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc45621a40 a2=0 a3=7ffc45621a2c items=0 ppid=1795 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:46:31.985000 audit[1913]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.985000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd55b2a5d0 a2=0 a3=7ffd55b2a5bc items=0 ppid=1795 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:46:31.990000 audit[1916]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.990000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffe064c490 a2=0 a3=7fffe064c47c items=0 ppid=1795 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:46:31.992000 audit[1917]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.992000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4f3ff870 a2=0 a3=7ffc4f3ff85c items=0 ppid=1795 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:46:31.996000 audit[1919]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.996000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdddf06ca0 a2=0 a3=7ffdddf06c8c items=0 ppid=1795 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:46:31.998000 audit[1920]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:31.998000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3c838150 a2=0 a3=7ffe3c83813c items=0 ppid=1795 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:31.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:46:32.002000 audit[1922]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.002000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9d3416d0 a2=0 a3=7ffe9d3416bc items=0 ppid=1795 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:46:32.008000 audit[1925]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.008000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc48daa3e0 a2=0 a3=7ffc48daa3cc items=0 ppid=1795 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:46:32.013000 audit[1928]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.013000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee000af40 a2=0 a3=7ffee000af2c items=0 ppid=1795 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:46:32.015000 audit[1929]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.015000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc08767e80 a2=0 a3=7ffc08767e6c items=0 ppid=1795 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:46:32.018000 audit[1931]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.018000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5169b8d0 a2=0 a3=7ffd5169b8bc items=0 ppid=1795 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:46:32.023000 audit[1934]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.023000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc19f67b50 a2=0 a3=7ffc19f67b3c items=0 ppid=1795 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:46:32.025000 audit[1935]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.025000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb3da00f0 a2=0 a3=7ffdb3da00dc items=0 ppid=1795 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:46:32.028000 audit[1937]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.028000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc1b2c0cc0 a2=0 a3=7ffc1b2c0cac items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:46:32.030000 audit[1938]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.030000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4c831c40 a2=0 a3=7fff4c831c2c items=0 ppid=1795 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:46:32.033000 audit[1940]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.033000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3dec86b0 a2=0 a3=7fff3dec869c items=0 ppid=1795 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:46:32.039000 audit[1943]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:46:32.039000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca3f1f860 a2=0 a3=7ffca3f1f84c items=0 ppid=1795 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:46:32.044000 audit[1945]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:46:32.044000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe0de27f30 a2=0 a3=7ffe0de27f1c items=0 ppid=1795 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.044000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:46:32.044000 audit[1945]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:46:32.044000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe0de27f30 a2=0 a3=7ffe0de27f1c items=0 ppid=1795 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:32.044000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:46:32.260242 kubelet[1558]: E0913 00:46:32.260174 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:32.495785 kubelet[1558]: I0913 00:46:32.495687 1558 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-tpnvt" podStartSLOduration=3.474950994 podStartE2EDuration="6.495662806s" podCreationTimestamp="2025-09-13 00:46:26 +0000 UTC" firstStartedPulling="2025-09-13 00:46:28.405458332 +0000 UTC m=+2.876061519" lastFinishedPulling="2025-09-13 00:46:31.426170139 +0000 UTC m=+5.896773331" observedRunningTime="2025-09-13 00:46:32.495580125 +0000 UTC m=+6.966183320" watchObservedRunningTime="2025-09-13 00:46:32.495662806 +0000 UTC m=+6.966266007" Sep 13 00:46:33.260621 kubelet[1558]: E0913 00:46:33.260548 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:33.457819 kubelet[1558]: E0913 00:46:33.457319 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:46:34.261555 kubelet[1558]: E0913 00:46:34.261430 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:34.668008 kernel: kauditd_printk_skb: 348 callbacks suppressed Sep 13 00:46:34.668181 kernel: audit: type=1131 audit(1757724394.637:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:34.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:34.638405 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 13 00:46:34.684000 audit: BPF prog-id=54 op=UNLOAD Sep 13 00:46:34.700257 kernel: audit: type=1334 audit(1757724394.684:538): prog-id=54 op=UNLOAD Sep 13 00:46:34.700376 kernel: audit: type=1334 audit(1757724394.684:539): prog-id=53 op=UNLOAD Sep 13 00:46:34.684000 audit: BPF prog-id=53 op=UNLOAD Sep 13 00:46:34.684000 audit: BPF prog-id=52 op=UNLOAD Sep 13 00:46:34.708512 kernel: audit: type=1334 audit(1757724394.684:540): prog-id=52 op=UNLOAD Sep 13 00:46:35.261819 kubelet[1558]: E0913 00:46:35.261749 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:35.263914 env[1219]: time="2025-09-13T00:46:35.263854298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:35.267058 env[1219]: time="2025-09-13T00:46:35.267007046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:35.269170 env[1219]: time="2025-09-13T00:46:35.269105906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:35.271341 env[1219]: time="2025-09-13T00:46:35.271282004Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:35.272111 env[1219]: time="2025-09-13T00:46:35.272054954Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:46:35.275231 env[1219]: time="2025-09-13T00:46:35.275188978Z" level=info msg="CreateContainer within sandbox \"b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:46:35.298826 env[1219]: time="2025-09-13T00:46:35.298750341Z" level=info msg="CreateContainer within sandbox \"b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a\"" Sep 13 00:46:35.299574 env[1219]: time="2025-09-13T00:46:35.299525107Z" level=info msg="StartContainer for \"423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a\"" Sep 13 00:46:35.335065 systemd[1]: run-containerd-runc-k8s.io-423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a-runc.DfLV1P.mount: Deactivated successfully. Sep 13 00:46:35.342813 systemd[1]: Started cri-containerd-423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a.scope. Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.386541 kernel: audit: type=1400 audit(1757724395.362:541): avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3aa44b3208 items=0 ppid=1644 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:35.448526 kernel: audit: type=1300 audit(1757724395.362:541): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3aa44b3208 items=0 ppid=1644 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:35.449169 kernel: audit: type=1327 audit(1757724395.362:541): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336435303033393032653939326266303634613065636237613133 Sep 13 00:46:35.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336435303033393032653939326266303634613065636237613133 Sep 13 00:46:35.450134 env[1219]: time="2025-09-13T00:46:35.450078740Z" level=info msg="StartContainer for \"423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a\" returns successfully" Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.471214 kubelet[1558]: E0913 00:46:35.457152 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:46:35.471624 kernel: audit: type=1400 audit(1757724395.362:542): avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.492500 kernel: audit: type=1400 audit(1757724395.362:542): avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.515505 kernel: audit: type=1400 audit(1757724395.362:542): avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit: BPF prog-id=75 op=LOAD Sep 13 00:46:35.362000 audit[1956]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003be508 items=0 ppid=1644 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:35.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336435303033393032653939326266303634613065636237613133 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.362000 audit: BPF prog-id=76 op=LOAD Sep 13 00:46:35.362000 audit[1956]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003be558 items=0 ppid=1644 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:35.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336435303033393032653939326266303634613065636237613133 Sep 13 00:46:35.363000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:46:35.363000 audit: BPF prog-id=75 op=UNLOAD Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { perfmon } for pid=1956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit[1956]: AVC avc: denied { bpf } for pid=1956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:35.363000 audit: BPF prog-id=77 op=LOAD Sep 13 00:46:35.363000 audit[1956]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003be5e8 items=0 ppid=1644 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:35.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432336435303033393032653939326266303634613065636237613133 Sep 13 00:46:36.262857 kubelet[1558]: E0913 00:46:36.262762 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:36.473525 env[1219]: time="2025-09-13T00:46:36.473413810Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:46:36.476031 systemd[1]: cri-containerd-423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a.scope: Deactivated successfully. Sep 13 00:46:36.477000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:46:36.507008 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a-rootfs.mount: Deactivated successfully. Sep 13 00:46:36.542379 kubelet[1558]: I0913 00:46:36.514948 1558 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 13 00:46:36.713000 audit[1997]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:46:36.713000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe8fa2a5a0 a2=0 a3=7ffe8fa2a58c items=0 ppid=1795 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:36.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:46:36.718000 audit[1997]: NETFILTER_CFG table=nat:66 family=2 entries=38 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:46:36.718000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7ffe8fa2a5a0 a2=0 a3=7ffe8fa2a58c items=0 ppid=1795 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:36.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:46:37.263642 kubelet[1558]: E0913 00:46:37.263566 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:37.449870 env[1219]: time="2025-09-13T00:46:37.449793022Z" level=info msg="shim disconnected" id=423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a Sep 13 00:46:37.449870 env[1219]: time="2025-09-13T00:46:37.449858102Z" level=warning msg="cleaning up after shim disconnected" id=423d5003902e992bf064a0ecb7a13c319797413fdbf1f0579db8cd374a15be0a namespace=k8s.io Sep 13 00:46:37.449870 env[1219]: time="2025-09-13T00:46:37.449875078Z" level=info msg="cleaning up dead shim" Sep 13 00:46:37.463072 env[1219]: time="2025-09-13T00:46:37.463003488Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:46:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1998 runtime=io.containerd.runc.v2\n" Sep 13 00:46:37.464161 systemd[1]: Created slice kubepods-besteffort-pod8878325d_ae4e_4d2c_a09b_f5dc650071a3.slice. Sep 13 00:46:37.468639 env[1219]: time="2025-09-13T00:46:37.468585979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9tsxc,Uid:8878325d-ae4e-4d2c-a09b-f5dc650071a3,Namespace:calico-system,Attempt:0,}" Sep 13 00:46:37.502716 env[1219]: time="2025-09-13T00:46:37.502658274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:46:37.563599 env[1219]: time="2025-09-13T00:46:37.559118916Z" level=error msg="Failed to destroy network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:37.562350 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4-shm.mount: Deactivated successfully. Sep 13 00:46:37.564142 env[1219]: time="2025-09-13T00:46:37.564018655Z" level=error msg="encountered an error cleaning up failed sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:37.564142 env[1219]: time="2025-09-13T00:46:37.564110380Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9tsxc,Uid:8878325d-ae4e-4d2c-a09b-f5dc650071a3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:37.565984 kubelet[1558]: E0913 00:46:37.565911 1558 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:37.566132 kubelet[1558]: E0913 00:46:37.566047 1558 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9tsxc" Sep 13 00:46:37.566132 kubelet[1558]: E0913 00:46:37.566104 1558 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9tsxc" Sep 13 00:46:37.566620 kubelet[1558]: E0913 00:46:37.566203 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9tsxc_calico-system(8878325d-ae4e-4d2c-a09b-f5dc650071a3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9tsxc_calico-system(8878325d-ae4e-4d2c-a09b-f5dc650071a3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:46:38.264351 kubelet[1558]: E0913 00:46:38.264245 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:38.503559 kubelet[1558]: I0913 00:46:38.503521 1558 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:46:38.504617 env[1219]: time="2025-09-13T00:46:38.504552944Z" level=info msg="StopPodSandbox for \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\"" Sep 13 00:46:38.600029 env[1219]: time="2025-09-13T00:46:38.599861314Z" level=error msg="StopPodSandbox for \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\" failed" error="failed to destroy network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:38.600512 kubelet[1558]: E0913 00:46:38.600444 1558 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:46:38.600679 kubelet[1558]: E0913 00:46:38.600537 1558 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4"} Sep 13 00:46:38.600679 kubelet[1558]: E0913 00:46:38.600625 1558 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8878325d-ae4e-4d2c-a09b-f5dc650071a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:46:38.600679 kubelet[1558]: E0913 00:46:38.600661 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8878325d-ae4e-4d2c-a09b-f5dc650071a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:46:39.265507 kubelet[1558]: E0913 00:46:39.265407 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:39.981999 systemd[1]: Created slice kubepods-besteffort-podb4644e38_d972_4430_b47f_48d1d59f6d4b.slice. Sep 13 00:46:40.123103 kubelet[1558]: I0913 00:46:40.123045 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s5q79\" (UniqueName: \"kubernetes.io/projected/b4644e38-d972-4430-b47f-48d1d59f6d4b-kube-api-access-s5q79\") pod \"nginx-deployment-8587fbcb89-b64pt\" (UID: \"b4644e38-d972-4430-b47f-48d1d59f6d4b\") " pod="default/nginx-deployment-8587fbcb89-b64pt" Sep 13 00:46:40.266149 kubelet[1558]: E0913 00:46:40.265691 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:40.287755 env[1219]: time="2025-09-13T00:46:40.287699566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-b64pt,Uid:b4644e38-d972-4430-b47f-48d1d59f6d4b,Namespace:default,Attempt:0,}" Sep 13 00:46:40.429181 env[1219]: time="2025-09-13T00:46:40.429082557Z" level=error msg="Failed to destroy network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:40.432401 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936-shm.mount: Deactivated successfully. Sep 13 00:46:40.434255 env[1219]: time="2025-09-13T00:46:40.434188467Z" level=error msg="encountered an error cleaning up failed sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:40.434540 env[1219]: time="2025-09-13T00:46:40.434428697Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-b64pt,Uid:b4644e38-d972-4430-b47f-48d1d59f6d4b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:40.435430 kubelet[1558]: E0913 00:46:40.434980 1558 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:40.435430 kubelet[1558]: E0913 00:46:40.435057 1558 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-b64pt" Sep 13 00:46:40.435430 kubelet[1558]: E0913 00:46:40.435092 1558 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-b64pt" Sep 13 00:46:40.435740 kubelet[1558]: E0913 00:46:40.435150 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-b64pt_default(b4644e38-d972-4430-b47f-48d1d59f6d4b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-b64pt_default(b4644e38-d972-4430-b47f-48d1d59f6d4b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-b64pt" podUID="b4644e38-d972-4430-b47f-48d1d59f6d4b" Sep 13 00:46:40.508575 kubelet[1558]: I0913 00:46:40.507840 1558 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:46:40.509001 env[1219]: time="2025-09-13T00:46:40.508959879Z" level=info msg="StopPodSandbox for \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\"" Sep 13 00:46:40.571851 env[1219]: time="2025-09-13T00:46:40.571652694Z" level=error msg="StopPodSandbox for \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\" failed" error="failed to destroy network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:46:40.572957 kubelet[1558]: E0913 00:46:40.572899 1558 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:46:40.573104 kubelet[1558]: E0913 00:46:40.572990 1558 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936"} Sep 13 00:46:40.573104 kubelet[1558]: E0913 00:46:40.573068 1558 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b4644e38-d972-4430-b47f-48d1d59f6d4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:46:40.573296 kubelet[1558]: E0913 00:46:40.573110 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b4644e38-d972-4430-b47f-48d1d59f6d4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-b64pt" podUID="b4644e38-d972-4430-b47f-48d1d59f6d4b" Sep 13 00:46:41.266572 kubelet[1558]: E0913 00:46:41.266458 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:42.267311 kubelet[1558]: E0913 00:46:42.267209 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:43.267940 kubelet[1558]: E0913 00:46:43.267847 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:44.268429 kubelet[1558]: E0913 00:46:44.268374 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:44.384092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount990513876.mount: Deactivated successfully. Sep 13 00:46:44.416132 env[1219]: time="2025-09-13T00:46:44.416044556Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:44.419047 env[1219]: time="2025-09-13T00:46:44.418996418Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:44.421198 env[1219]: time="2025-09-13T00:46:44.421135133Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:44.423223 env[1219]: time="2025-09-13T00:46:44.423165267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:44.423920 env[1219]: time="2025-09-13T00:46:44.423879446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:46:44.445404 env[1219]: time="2025-09-13T00:46:44.445328632Z" level=info msg="CreateContainer within sandbox \"b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:46:44.467547 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2565313285.mount: Deactivated successfully. Sep 13 00:46:44.476259 env[1219]: time="2025-09-13T00:46:44.476207014Z" level=info msg="CreateContainer within sandbox \"b52edb978508ea6bce38a6215996834fe9c3792cc3e2f42370c788af15d59baa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"be1f9958382e826a992952317584cea53ee93857f60335f040915b631edea2fe\"" Sep 13 00:46:44.476935 env[1219]: time="2025-09-13T00:46:44.476882433Z" level=info msg="StartContainer for \"be1f9958382e826a992952317584cea53ee93857f60335f040915b631edea2fe\"" Sep 13 00:46:44.502204 systemd[1]: Started cri-containerd-be1f9958382e826a992952317584cea53ee93857f60335f040915b631edea2fe.scope. Sep 13 00:46:44.562310 kernel: kauditd_printk_skb: 44 callbacks suppressed Sep 13 00:46:44.562565 kernel: audit: type=1400 audit(1757724404.534:550): avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9afeb28bb8 items=0 ppid=1644 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:44.595565 kernel: audit: type=1300 audit(1757724404.534:550): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9afeb28bb8 items=0 ppid=1644 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:44.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265316639393538333832653832366139393239353233313735383463 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.645882 kernel: audit: type=1327 audit(1757724404.534:550): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265316639393538333832653832366139393239353233313735383463 Sep 13 00:46:44.646030 kernel: audit: type=1400 audit(1757724404.534:551): avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.688564 kernel: audit: type=1400 audit(1757724404.534:551): avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.688690 kernel: audit: type=1400 audit(1757724404.534:551): avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.731782 kernel: audit: type=1400 audit(1757724404.534:551): avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.731949 kernel: audit: type=1400 audit(1757724404.534:551): avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.753281 kernel: audit: type=1400 audit(1757724404.534:551): avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.753455 kernel: audit: type=1400 audit(1757724404.534:551): avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.754054 env[1219]: time="2025-09-13T00:46:44.753991838Z" level=info msg="StartContainer for \"be1f9958382e826a992952317584cea53ee93857f60335f040915b631edea2fe\" returns successfully" Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.534000 audit: BPF prog-id=78 op=LOAD Sep 13 00:46:44.534000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000390978 items=0 ppid=1644 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:44.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265316639393538333832653832366139393239353233313735383463 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit: BPF prog-id=79 op=LOAD Sep 13 00:46:44.594000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0000253e8 items=0 ppid=1644 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:44.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265316639393538333832653832366139393239353233313735383463 Sep 13 00:46:44.594000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:46:44.594000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { perfmon } for pid=2113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit[2113]: AVC avc: denied { bpf } for pid=2113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:44.594000 audit: BPF prog-id=80 op=LOAD Sep 13 00:46:44.594000 audit[2113]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000025478 items=0 ppid=1644 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:44.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265316639393538333832653832366139393239353233313735383463 Sep 13 00:46:44.835312 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:46:44.835561 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:46:45.268587 kubelet[1558]: E0913 00:46:45.268516 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:45.551372 systemd[1]: run-containerd-runc-k8s.io-be1f9958382e826a992952317584cea53ee93857f60335f040915b631edea2fe-runc.UpwYwP.mount: Deactivated successfully. Sep 13 00:46:45.574303 kubelet[1558]: I0913 00:46:45.574205 1558 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-tb946" podStartSLOduration=3.542793024 podStartE2EDuration="19.574178282s" podCreationTimestamp="2025-09-13 00:46:26 +0000 UTC" firstStartedPulling="2025-09-13 00:46:28.39382653 +0000 UTC m=+2.864429716" lastFinishedPulling="2025-09-13 00:46:44.425211791 +0000 UTC m=+18.895814974" observedRunningTime="2025-09-13 00:46:45.57392103 +0000 UTC m=+20.044524227" watchObservedRunningTime="2025-09-13 00:46:45.574178282 +0000 UTC m=+20.044781557" Sep 13 00:46:46.180000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=19259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:46:46.180000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1741a7cc a2=241 a3=1b6 items=1 ppid=2207 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.180000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:46:46.180000 audit: PATH item=0 name="/dev/fd/63" inode=19761 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:46.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:46:46.185000 audit[2241]: AVC avc: denied { write } for pid=2241 comm="tee" name="fd" dev="proc" ino=19768 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:46:46.192000 audit[2247]: AVC avc: denied { write } for pid=2247 comm="tee" name="fd" dev="proc" ino=19266 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:46:46.192000 audit[2247]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce611c7ba a2=241 a3=1b6 items=1 ppid=2200 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.192000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:46:46.192000 audit: PATH item=0 name="/dev/fd/63" inode=19256 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:46.192000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:46:46.193000 audit[2237]: AVC avc: denied { write } for pid=2237 comm="tee" name="fd" dev="proc" ino=19273 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:46:46.193000 audit[2237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe066ce7bb a2=241 a3=1b6 items=1 ppid=2199 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.193000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:46:46.193000 audit: PATH item=0 name="/dev/fd/63" inode=19251 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:46.193000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:46:46.185000 audit[2241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff576267cb a2=241 a3=1b6 items=1 ppid=2195 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.185000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:46:46.185000 audit: PATH item=0 name="/dev/fd/63" inode=19762 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:46.185000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:46:46.199000 audit[2254]: AVC avc: denied { write } for pid=2254 comm="tee" name="fd" dev="proc" ino=19277 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:46:46.199000 audit[2254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde9f4f7ca a2=241 a3=1b6 items=1 ppid=2212 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.199000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:46:46.199000 audit: PATH item=0 name="/dev/fd/63" inode=19263 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:46.199000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:46:46.204000 audit[2244]: AVC avc: denied { write } for pid=2244 comm="tee" name="fd" dev="proc" ino=19774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:46:46.205000 audit[2260]: AVC avc: denied { write } for pid=2260 comm="tee" name="fd" dev="proc" ino=19281 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:46:46.205000 audit[2260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc119f7ca a2=241 a3=1b6 items=1 ppid=2202 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.205000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:46:46.205000 audit: PATH item=0 name="/dev/fd/63" inode=19270 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:46.205000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:46:46.204000 audit[2244]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc25567ca a2=241 a3=1b6 items=1 ppid=2205 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.204000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:46:46.204000 audit: PATH item=0 name="/dev/fd/63" inode=19765 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:46.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:46:46.236992 kubelet[1558]: E0913 00:46:46.236891 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:46.269682 kubelet[1558]: E0913 00:46:46.269575 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:46.562644 systemd[1]: run-containerd-runc-k8s.io-be1f9958382e826a992952317584cea53ee93857f60335f040915b631edea2fe-runc.k6H8XF.mount: Deactivated successfully. Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.612000 audit: BPF prog-id=81 op=LOAD Sep 13 00:46:46.612000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdc71d1920 a2=98 a3=1fffffffffffffff items=0 ppid=2203 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.612000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:46:46.613000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.613000 audit: BPF prog-id=82 op=LOAD Sep 13 00:46:46.613000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdc71d1800 a2=94 a3=3 items=0 ppid=2203 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.613000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:46:46.615000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.615000 audit: BPF prog-id=83 op=LOAD Sep 13 00:46:46.615000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdc71d1840 a2=94 a3=7ffdc71d1a20 items=0 ppid=2203 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.615000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:46:46.616000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:46:46.616000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.616000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdc71d1910 a2=50 a3=a000000085 items=0 ppid=2203 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.616000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.626000 audit: BPF prog-id=84 op=LOAD Sep 13 00:46:46.626000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe43e27000 a2=98 a3=3 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.628000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.628000 audit: BPF prog-id=85 op=LOAD Sep 13 00:46:46.628000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43e26df0 a2=94 a3=54428f items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.628000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.629000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.629000 audit: BPF prog-id=86 op=LOAD Sep 13 00:46:46.629000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43e26e20 a2=94 a3=2 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.629000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.630000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit: BPF prog-id=87 op=LOAD Sep 13 00:46:46.785000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43e26ce0 a2=94 a3=1 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.785000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:46:46.785000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.785000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe43e26db0 a2=50 a3=7ffe43e26e90 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43e26cf0 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43e26d20 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43e26c30 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43e26d40 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43e26d20 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43e26d10 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43e26d40 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43e26d20 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43e26d40 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43e26d10 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43e26d80 a2=28 a3=0 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe43e26b30 a2=50 a3=1 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.799000 audit: BPF prog-id=88 op=LOAD Sep 13 00:46:46.799000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe43e26b30 a2=94 a3=5 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.800000 audit: BPF prog-id=88 op=UNLOAD Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe43e26be0 a2=50 a3=1 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe43e26d00 a2=4 a3=38 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:46:46.800000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe43e26d50 a2=94 a3=6 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.800000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:46:46.800000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe43e26500 a2=94 a3=88 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.801000 audit[2328]: AVC avc: denied { confidentiality } for pid=2328 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:46:46.801000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe43e26500 a2=94 a3=88 items=0 ppid=2203 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.801000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.815000 audit: BPF prog-id=89 op=LOAD Sep 13 00:46:46.815000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbd81d910 a2=98 a3=1999999999999999 items=0 ppid=2203 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.815000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:46:46.816000 audit: BPF prog-id=89 op=UNLOAD Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit: BPF prog-id=90 op=LOAD Sep 13 00:46:46.816000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbd81d7f0 a2=94 a3=ffff items=0 ppid=2203 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.816000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:46:46.816000 audit: BPF prog-id=90 op=UNLOAD Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.816000 audit: BPF prog-id=91 op=LOAD Sep 13 00:46:46.816000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbd81d830 a2=94 a3=7ffdbd81da10 items=0 ppid=2203 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.816000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:46:46.816000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:46:46.909287 systemd-networkd[1030]: vxlan.calico: Link UP Sep 13 00:46:46.909299 systemd-networkd[1030]: vxlan.calico: Gained carrier Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.945000 audit: BPF prog-id=92 op=LOAD Sep 13 00:46:46.945000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2701b080 a2=98 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.945000 audit: BPF prog-id=92 op=UNLOAD Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit: BPF prog-id=93 op=LOAD Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2701ae90 a2=94 a3=54428f items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit: BPF prog-id=93 op=UNLOAD Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit: BPF prog-id=94 op=LOAD Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2701aec0 a2=94 a3=2 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit: BPF prog-id=94 op=UNLOAD Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2701ad90 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2701adc0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2701acd0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2701ade0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2701adc0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2701adb0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2701ade0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2701adc0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2701ade0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2701adb0 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2701ae20 a2=28 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.948000 audit: BPF prog-id=95 op=LOAD Sep 13 00:46:46.948000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2701ac90 a2=94 a3=0 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.948000 audit: BPF prog-id=95 op=UNLOAD Sep 13 00:46:46.949000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.949000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe2701ac80 a2=50 a3=2800 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe2701ac80 a2=50 a3=2800 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit: BPF prog-id=96 op=LOAD Sep 13 00:46:46.952000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2701a4a0 a2=94 a3=2 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.952000 audit: BPF prog-id=96 op=UNLOAD Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.952000 audit: BPF prog-id=97 op=LOAD Sep 13 00:46:46.952000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2701a5a0 a2=94 a3=30 items=0 ppid=2203 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.961000 audit: BPF prog-id=98 op=LOAD Sep 13 00:46:46.961000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec082d310 a2=98 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:46.961000 audit: BPF prog-id=98 op=UNLOAD Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit: BPF prog-id=99 op=LOAD Sep 13 00:46:46.962000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec082d100 a2=94 a3=54428f items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:46.962000 audit: BPF prog-id=99 op=UNLOAD Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:46.962000 audit: BPF prog-id=100 op=LOAD Sep 13 00:46:46.962000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec082d130 a2=94 a3=2 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:46.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:46.962000 audit: BPF prog-id=100 op=UNLOAD Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit: BPF prog-id=101 op=LOAD Sep 13 00:46:47.115000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec082cff0 a2=94 a3=1 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.115000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.115000 audit: BPF prog-id=101 op=UNLOAD Sep 13 00:46:47.115000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.115000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec082d0c0 a2=50 a3=7ffec082d1a0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.115000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec082d000 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec082d030 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec082cf40 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec082d050 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec082d030 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec082d020 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec082d050 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec082d030 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec082d050 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec082d020 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.130000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.130000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec082d090 a2=28 a3=0 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec082ce40 a2=50 a3=1 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit: BPF prog-id=102 op=LOAD Sep 13 00:46:47.131000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec082ce40 a2=94 a3=5 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.131000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec082cef0 a2=50 a3=1 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec082d010 a2=4 a3=38 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.131000 audit[2361]: AVC avc: denied { confidentiality } for pid=2361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:46:47.131000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec082d060 a2=94 a3=6 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { confidentiality } for pid=2361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:46:47.132000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec082c810 a2=94 a3=88 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.132000 audit[2361]: AVC avc: denied { confidentiality } for pid=2361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:46:47.132000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec082c810 a2=94 a3=88 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.133000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.133000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec082e240 a2=10 a3=f8f00800 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.133000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.133000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec082e0e0 a2=10 a3=3 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.133000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.133000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec082e080 a2=10 a3=3 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.133000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:47.133000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec082e080 a2=10 a3=7 items=0 ppid=2203 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:46:47.142000 audit: BPF prog-id=97 op=UNLOAD Sep 13 00:46:47.224000 audit[2387]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:46:47.224000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdc756be70 a2=0 a3=7ffdc756be5c items=0 ppid=2203 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.224000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:46:47.237000 audit[2386]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:46:47.237000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff2bd6ed10 a2=0 a3=7fff2bd6ecfc items=0 ppid=2203 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:46:47.240000 audit[2388]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:46:47.240000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd88e7c380 a2=0 a3=7ffd88e7c36c items=0 ppid=2203 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.240000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:46:47.245000 audit[2393]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:46:47.245000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff8d45c500 a2=0 a3=7fff8d45c4ec items=0 ppid=2203 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:47.245000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:46:47.269816 kubelet[1558]: E0913 00:46:47.269744 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:48.270019 kubelet[1558]: E0913 00:46:48.269947 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:48.843862 systemd-networkd[1030]: vxlan.calico: Gained IPv6LL Sep 13 00:46:49.270790 kubelet[1558]: E0913 00:46:49.270714 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:49.331764 update_engine[1208]: I0913 00:46:49.331682 1208 update_attempter.cc:509] Updating boot flags... Sep 13 00:46:50.271382 kubelet[1558]: E0913 00:46:50.271306 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:51.272187 kubelet[1558]: E0913 00:46:51.272117 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:52.272827 kubelet[1558]: E0913 00:46:52.272759 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:52.458536 env[1219]: time="2025-09-13T00:46:52.458456673Z" level=info msg="StopPodSandbox for \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\"" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.515 [INFO][2430] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.516 [INFO][2430] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" iface="eth0" netns="/var/run/netns/cni-9e4c0f12-e2f8-0e2b-0d93-753f7213bce8" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.516 [INFO][2430] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" iface="eth0" netns="/var/run/netns/cni-9e4c0f12-e2f8-0e2b-0d93-753f7213bce8" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.516 [INFO][2430] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" iface="eth0" netns="/var/run/netns/cni-9e4c0f12-e2f8-0e2b-0d93-753f7213bce8" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.516 [INFO][2430] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.516 [INFO][2430] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.546 [INFO][2438] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.547 [INFO][2438] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.547 [INFO][2438] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.556 [WARNING][2438] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.556 [INFO][2438] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.558 [INFO][2438] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:46:52.563726 env[1219]: 2025-09-13 00:46:52.561 [INFO][2430] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:46:52.566740 env[1219]: time="2025-09-13T00:46:52.566681792Z" level=info msg="TearDown network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\" successfully" Sep 13 00:46:52.566947 env[1219]: time="2025-09-13T00:46:52.566908315Z" level=info msg="StopPodSandbox for \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\" returns successfully" Sep 13 00:46:52.568332 env[1219]: time="2025-09-13T00:46:52.568288515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9tsxc,Uid:8878325d-ae4e-4d2c-a09b-f5dc650071a3,Namespace:calico-system,Attempt:1,}" Sep 13 00:46:52.568998 systemd[1]: run-netns-cni\x2d9e4c0f12\x2de2f8\x2d0e2b\x2d0d93\x2d753f7213bce8.mount: Deactivated successfully. Sep 13 00:46:52.732437 systemd-networkd[1030]: cali081c8c8c5ec: Link UP Sep 13 00:46:52.747656 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:46:52.747809 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali081c8c8c5ec: link becomes ready Sep 13 00:46:52.748891 systemd-networkd[1030]: cali081c8c8c5ec: Gained carrier Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.643 [INFO][2444] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.96-k8s-csi--node--driver--9tsxc-eth0 csi-node-driver- calico-system 8878325d-ae4e-4d2c-a09b-f5dc650071a3 1296 0 2025-09-13 00:46:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.96 csi-node-driver-9tsxc eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali081c8c8c5ec [] [] }} ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.643 [INFO][2444] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.677 [INFO][2457] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" HandleID="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.677 [INFO][2457] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" HandleID="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.96", "pod":"csi-node-driver-9tsxc", "timestamp":"2025-09-13 00:46:52.677207116 +0000 UTC"}, Hostname:"10.128.0.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.677 [INFO][2457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.677 [INFO][2457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.678 [INFO][2457] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.96' Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.688 [INFO][2457] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.694 [INFO][2457] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.702 [INFO][2457] ipam/ipam.go 511: Trying affinity for 192.168.29.192/26 host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.705 [INFO][2457] ipam/ipam.go 158: Attempting to load block cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.707 [INFO][2457] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.707 [INFO][2457] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.709 [INFO][2457] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42 Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.713 [INFO][2457] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.720 [INFO][2457] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.29.193/26] block=192.168.29.192/26 handle="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.720 [INFO][2457] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.29.193/26] handle="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" host="10.128.0.96" Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.720 [INFO][2457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:46:52.770707 env[1219]: 2025-09-13 00:46:52.720 [INFO][2457] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.193/26] IPv6=[] ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" HandleID="k8s-pod-network.efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.772141 env[1219]: 2025-09-13 00:46:52.723 [INFO][2444] cni-plugin/k8s.go 418: Populated endpoint ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-csi--node--driver--9tsxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8878325d-ae4e-4d2c-a09b-f5dc650071a3", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"", Pod:"csi-node-driver-9tsxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali081c8c8c5ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:46:52.772141 env[1219]: 2025-09-13 00:46:52.723 [INFO][2444] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.29.193/32] ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.772141 env[1219]: 2025-09-13 00:46:52.723 [INFO][2444] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali081c8c8c5ec ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.772141 env[1219]: 2025-09-13 00:46:52.749 [INFO][2444] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.772141 env[1219]: 2025-09-13 00:46:52.749 [INFO][2444] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-csi--node--driver--9tsxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8878325d-ae4e-4d2c-a09b-f5dc650071a3", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42", Pod:"csi-node-driver-9tsxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali081c8c8c5ec", MAC:"4a:25:32:3d:58:d9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:46:52.772141 env[1219]: 2025-09-13 00:46:52.765 [INFO][2444] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42" Namespace="calico-system" Pod="csi-node-driver-9tsxc" WorkloadEndpoint="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:46:52.787428 env[1219]: time="2025-09-13T00:46:52.787325606Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:46:52.787428 env[1219]: time="2025-09-13T00:46:52.787381372Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:46:52.787428 env[1219]: time="2025-09-13T00:46:52.787399138Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:46:52.788038 env[1219]: time="2025-09-13T00:46:52.787972178Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42 pid=2483 runtime=io.containerd.runc.v2 Sep 13 00:46:52.825570 systemd[1]: run-containerd-runc-k8s.io-efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42-runc.NNSAOz.mount: Deactivated successfully. Sep 13 00:46:52.836597 systemd[1]: Started cri-containerd-efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42.scope. Sep 13 00:46:52.804000 audit[2484]: NETFILTER_CFG table=filter:71 family=2 entries=38 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:46:52.846105 kernel: kauditd_printk_skb: 594 callbacks suppressed Sep 13 00:46:52.846215 kernel: audit: type=1325 audit(1757724412.804:665): table=filter:71 family=2 entries=38 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:46:52.869605 kernel: audit: type=1300 audit(1757724412.804:665): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe0f438170 a2=0 a3=7ffe0f43815c items=0 ppid=2203 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:52.804000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe0f438170 a2=0 a3=7ffe0f43815c items=0 ppid=2203 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:52.914796 kernel: audit: type=1327 audit(1757724412.804:665): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:46:52.804000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:46:52.935907 kernel: audit: type=1400 audit(1757724412.896:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.979841 kernel: audit: type=1400 audit(1757724412.896:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.980004 kernel: audit: type=1400 audit(1757724412.896:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:53.000951 kernel: audit: type=1400 audit(1757724412.896:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:53.022199 kernel: audit: type=1400 audit(1757724412.896:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:53.022247 kernel: audit: type=1400 audit(1757724412.896:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:53.064210 kernel: audit: type=1400 audit(1757724412.896:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.935000 audit: BPF prog-id=103 op=LOAD Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2483 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:52.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633263363230336434306664386437376337376435613532393537 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2483 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:52.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633263363230336434306664386437376337376435613532393537 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.938000 audit: BPF prog-id=104 op=LOAD Sep 13 00:46:52.938000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000328350 items=0 ppid=2483 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:52.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633263363230336434306664386437376337376435613532393537 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit: BPF prog-id=105 op=LOAD Sep 13 00:46:52.958000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000328398 items=0 ppid=2483 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:52.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633263363230336434306664386437376337376435613532393537 Sep 13 00:46:52.958000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:46:52.958000 audit: BPF prog-id=104 op=UNLOAD Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:52.958000 audit: BPF prog-id=106 op=LOAD Sep 13 00:46:52.958000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003287a8 items=0 ppid=2483 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:52.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633263363230336434306664386437376337376435613532393537 Sep 13 00:46:53.080601 env[1219]: time="2025-09-13T00:46:53.080029642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9tsxc,Uid:8878325d-ae4e-4d2c-a09b-f5dc650071a3,Namespace:calico-system,Attempt:1,} returns sandbox id \"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42\"" Sep 13 00:46:53.084815 env[1219]: time="2025-09-13T00:46:53.084774596Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:46:53.273385 kubelet[1558]: E0913 00:46:53.273309 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:53.900178 systemd-networkd[1030]: cali081c8c8c5ec: Gained IPv6LL Sep 13 00:46:54.133625 env[1219]: time="2025-09-13T00:46:54.133552352Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.136147 env[1219]: time="2025-09-13T00:46:54.136093298Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.138367 env[1219]: time="2025-09-13T00:46:54.138323307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.140317 env[1219]: time="2025-09-13T00:46:54.140278429Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.141043 env[1219]: time="2025-09-13T00:46:54.140992674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:46:54.144139 env[1219]: time="2025-09-13T00:46:54.144096400Z" level=info msg="CreateContainer within sandbox \"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:46:54.163072 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3683391664.mount: Deactivated successfully. Sep 13 00:46:54.168345 env[1219]: time="2025-09-13T00:46:54.168284722Z" level=info msg="CreateContainer within sandbox \"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5232ff52c1ae8c2971c00a56a0f3350ef47cedbd5213df2e202cbf9ea20745b0\"" Sep 13 00:46:54.169277 env[1219]: time="2025-09-13T00:46:54.169241139Z" level=info msg="StartContainer for \"5232ff52c1ae8c2971c00a56a0f3350ef47cedbd5213df2e202cbf9ea20745b0\"" Sep 13 00:46:54.206437 systemd[1]: run-containerd-runc-k8s.io-5232ff52c1ae8c2971c00a56a0f3350ef47cedbd5213df2e202cbf9ea20745b0-runc.oMUMDD.mount: Deactivated successfully. Sep 13 00:46:54.216941 systemd[1]: Started cri-containerd-5232ff52c1ae8c2971c00a56a0f3350ef47cedbd5213df2e202cbf9ea20745b0.scope. Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f3289ce52f8 items=0 ppid=2483 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333266663532633161653863323937316330306135366130663333 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit: BPF prog-id=107 op=LOAD Sep 13 00:46:54.237000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000024258 items=0 ppid=2483 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333266663532633161653863323937316330306135366130663333 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.237000 audit: BPF prog-id=108 op=LOAD Sep 13 00:46:54.237000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0000242a8 items=0 ppid=2483 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333266663532633161653863323937316330306135366130663333 Sep 13 00:46:54.238000 audit: BPF prog-id=108 op=UNLOAD Sep 13 00:46:54.238000 audit: BPF prog-id=107 op=UNLOAD Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.238000 audit: BPF prog-id=109 op=LOAD Sep 13 00:46:54.238000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000024338 items=0 ppid=2483 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333266663532633161653863323937316330306135366130663333 Sep 13 00:46:54.262181 env[1219]: time="2025-09-13T00:46:54.262106262Z" level=info msg="StartContainer for \"5232ff52c1ae8c2971c00a56a0f3350ef47cedbd5213df2e202cbf9ea20745b0\" returns successfully" Sep 13 00:46:54.264058 env[1219]: time="2025-09-13T00:46:54.264021742Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:46:54.274273 kubelet[1558]: E0913 00:46:54.274222 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:54.459801 env[1219]: time="2025-09-13T00:46:54.459712534Z" level=info msg="StopPodSandbox for \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\"" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.513 [INFO][2570] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.513 [INFO][2570] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" iface="eth0" netns="/var/run/netns/cni-cf64512c-0ce9-b244-8c71-e950fcc6756b" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.513 [INFO][2570] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" iface="eth0" netns="/var/run/netns/cni-cf64512c-0ce9-b244-8c71-e950fcc6756b" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.514 [INFO][2570] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" iface="eth0" netns="/var/run/netns/cni-cf64512c-0ce9-b244-8c71-e950fcc6756b" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.514 [INFO][2570] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.514 [INFO][2570] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.555 [INFO][2577] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.556 [INFO][2577] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.556 [INFO][2577] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.565 [WARNING][2577] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.565 [INFO][2577] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.567 [INFO][2577] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:46:54.570623 env[1219]: 2025-09-13 00:46:54.569 [INFO][2570] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:46:54.574594 env[1219]: time="2025-09-13T00:46:54.570932121Z" level=info msg="TearDown network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\" successfully" Sep 13 00:46:54.574594 env[1219]: time="2025-09-13T00:46:54.570990759Z" level=info msg="StopPodSandbox for \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\" returns successfully" Sep 13 00:46:54.574594 env[1219]: time="2025-09-13T00:46:54.571898649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-b64pt,Uid:b4644e38-d972-4430-b47f-48d1d59f6d4b,Namespace:default,Attempt:1,}" Sep 13 00:46:54.724700 systemd-networkd[1030]: calie6957f6b8a4: Link UP Sep 13 00:46:54.738669 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:46:54.738788 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie6957f6b8a4: link becomes ready Sep 13 00:46:54.740192 systemd-networkd[1030]: calie6957f6b8a4: Gained carrier Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.632 [INFO][2583] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0 nginx-deployment-8587fbcb89- default b4644e38-d972-4430-b47f-48d1d59f6d4b 1310 0 2025-09-13 00:46:39 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.96 nginx-deployment-8587fbcb89-b64pt eth0 default [] [] [kns.default ksa.default.default] calie6957f6b8a4 [] [] }} ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.632 [INFO][2583] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.665 [INFO][2595] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" HandleID="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.665 [INFO][2595] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" HandleID="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d56c0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.96", "pod":"nginx-deployment-8587fbcb89-b64pt", "timestamp":"2025-09-13 00:46:54.665139383 +0000 UTC"}, Hostname:"10.128.0.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.666 [INFO][2595] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.666 [INFO][2595] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.666 [INFO][2595] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.96' Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.676 [INFO][2595] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.686 [INFO][2595] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.694 [INFO][2595] ipam/ipam.go 511: Trying affinity for 192.168.29.192/26 host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.696 [INFO][2595] ipam/ipam.go 158: Attempting to load block cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.699 [INFO][2595] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.700 [INFO][2595] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.702 [INFO][2595] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0 Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.708 [INFO][2595] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.715 [INFO][2595] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.29.194/26] block=192.168.29.192/26 handle="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.715 [INFO][2595] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.29.194/26] handle="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" host="10.128.0.96" Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.715 [INFO][2595] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:46:54.758086 env[1219]: 2025-09-13 00:46:54.715 [INFO][2595] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.194/26] IPv6=[] ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" HandleID="k8s-pod-network.c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.759271 env[1219]: 2025-09-13 00:46:54.717 [INFO][2583] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b4644e38-d972-4430-b47f-48d1d59f6d4b", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-b64pt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie6957f6b8a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:46:54.759271 env[1219]: 2025-09-13 00:46:54.717 [INFO][2583] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.29.194/32] ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.759271 env[1219]: 2025-09-13 00:46:54.717 [INFO][2583] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie6957f6b8a4 ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.759271 env[1219]: 2025-09-13 00:46:54.746 [INFO][2583] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.759271 env[1219]: 2025-09-13 00:46:54.747 [INFO][2583] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b4644e38-d972-4430-b47f-48d1d59f6d4b", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0", Pod:"nginx-deployment-8587fbcb89-b64pt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie6957f6b8a4", MAC:"ba:89:c7:63:1b:31", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:46:54.759271 env[1219]: 2025-09-13 00:46:54.756 [INFO][2583] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0" Namespace="default" Pod="nginx-deployment-8587fbcb89-b64pt" WorkloadEndpoint="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:46:54.776000 audit[2611]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2611 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:46:54.776000 audit[2611]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffec212b2f0 a2=0 a3=7ffec212b2dc items=0 ppid=2203 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.776000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:46:54.784021 env[1219]: time="2025-09-13T00:46:54.783904839Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:46:54.784021 env[1219]: time="2025-09-13T00:46:54.783958971Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:46:54.784021 env[1219]: time="2025-09-13T00:46:54.783979157Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:46:54.784523 env[1219]: time="2025-09-13T00:46:54.784218668Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0 pid=2620 runtime=io.containerd.runc.v2 Sep 13 00:46:54.804081 systemd[1]: Started cri-containerd-c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0.scope. Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.831000 audit: BPF prog-id=110 op=LOAD Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643533646435383639326266393332303063333366653164633131 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643533646435383639326266393332303063333366653164633131 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit: BPF prog-id=111 op=LOAD Sep 13 00:46:54.832000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025fce0 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643533646435383639326266393332303063333366653164633131 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit: BPF prog-id=112 op=LOAD Sep 13 00:46:54.832000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025fd28 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643533646435383639326266393332303063333366653164633131 Sep 13 00:46:54.832000 audit: BPF prog-id=112 op=UNLOAD Sep 13 00:46:54.832000 audit: BPF prog-id=111 op=UNLOAD Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:46:54.832000 audit: BPF prog-id=113 op=LOAD Sep 13 00:46:54.832000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000362138 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:54.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643533646435383639326266393332303063333366653164633131 Sep 13 00:46:54.874246 env[1219]: time="2025-09-13T00:46:54.874186783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-b64pt,Uid:b4644e38-d972-4430-b47f-48d1d59f6d4b,Namespace:default,Attempt:1,} returns sandbox id \"c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0\"" Sep 13 00:46:55.158191 systemd[1]: run-netns-cni\x2dcf64512c\x2d0ce9\x2db244\x2d8c71\x2de950fcc6756b.mount: Deactivated successfully. Sep 13 00:46:55.274944 kubelet[1558]: E0913 00:46:55.274891 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:56.268375 systemd-networkd[1030]: calie6957f6b8a4: Gained IPv6LL Sep 13 00:46:56.275491 kubelet[1558]: E0913 00:46:56.275421 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:57.276494 kubelet[1558]: E0913 00:46:57.276426 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:58.277066 kubelet[1558]: E0913 00:46:58.276992 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:46:59.277661 kubelet[1558]: E0913 00:46:59.277582 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:00.278368 kubelet[1558]: E0913 00:47:00.278298 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:01.278918 kubelet[1558]: E0913 00:47:01.278840 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:02.279311 kubelet[1558]: E0913 00:47:02.279233 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:03.279656 kubelet[1558]: E0913 00:47:03.279586 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:04.280802 kubelet[1558]: E0913 00:47:04.280735 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:05.281368 kubelet[1558]: E0913 00:47:05.281293 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:06.236529 kubelet[1558]: E0913 00:47:06.236446 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:06.282391 kubelet[1558]: E0913 00:47:06.282321 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:07.282881 kubelet[1558]: E0913 00:47:07.282809 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:08.283787 kubelet[1558]: E0913 00:47:08.283717 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:09.284548 kubelet[1558]: E0913 00:47:09.284463 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:10.285373 kubelet[1558]: E0913 00:47:10.285303 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:11.286353 kubelet[1558]: E0913 00:47:11.286276 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:12.287233 kubelet[1558]: E0913 00:47:12.287158 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:13.287961 kubelet[1558]: E0913 00:47:13.287898 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:14.288555 kubelet[1558]: E0913 00:47:14.288506 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:15.290110 kubelet[1558]: E0913 00:47:15.290028 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:16.290514 kubelet[1558]: E0913 00:47:16.290441 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:17.290740 kubelet[1558]: E0913 00:47:17.290682 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:18.291682 kubelet[1558]: E0913 00:47:18.291626 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:19.292103 kubelet[1558]: E0913 00:47:19.292033 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:20.292770 kubelet[1558]: E0913 00:47:20.292689 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:21.293357 kubelet[1558]: E0913 00:47:21.293298 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:22.293807 kubelet[1558]: E0913 00:47:22.293741 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:23.293957 kubelet[1558]: E0913 00:47:23.293882 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:24.295044 kubelet[1558]: E0913 00:47:24.294963 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:24.561639 env[1219]: time="2025-09-13T00:47:24.561464073Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\": failed to copy: httpReadSeeker: failed open: failed to authorize: failed to fetch anonymous token: Get \"https://ghcr.io/token?scope=repository%3Aflatcar%2Fcalico%2Fnode-driver-registrar%3Apull&service=ghcr.io\": dial tcp 140.82.114.33:443: i/o timeout" Sep 13 00:47:24.562211 kubelet[1558]: E0913 00:47:24.561874 1558 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\": failed to copy: httpReadSeeker: failed open: failed to authorize: failed to fetch anonymous token: Get \"https://ghcr.io/token?scope=repository%3Aflatcar%2Fcalico%2Fnode-driver-registrar%3Apull&service=ghcr.io\": dial tcp 140.82.114.33:443: i/o timeout" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3" Sep 13 00:47:24.562211 kubelet[1558]: E0913 00:47:24.561943 1558 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\": failed to copy: httpReadSeeker: failed open: failed to authorize: failed to fetch anonymous token: Get \"https://ghcr.io/token?scope=repository%3Aflatcar%2Fcalico%2Fnode-driver-registrar%3Apull&service=ghcr.io\": dial tcp 140.82.114.33:443: i/o timeout" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3" Sep 13 00:47:24.562907 env[1219]: time="2025-09-13T00:47:24.562859226Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:47:24.566333 kubelet[1558]: E0913 00:47:24.566217 1558 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bwvxq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-9tsxc_calico-system(8878325d-ae4e-4d2c-a09b-f5dc650071a3): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\": failed to copy: httpReadSeeker: failed open: failed to authorize: failed to fetch anonymous token: Get \"https://ghcr.io/token?scope=repository%3Aflatcar%2Fcalico%2Fnode-driver-registrar%3Apull&service=ghcr.io\": dial tcp 140.82.114.33:443: i/o timeout" logger="UnhandledError" Sep 13 00:47:24.567764 kubelet[1558]: E0913 00:47:24.567696 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\\\": failed to copy: httpReadSeeker: failed open: failed to authorize: failed to fetch anonymous token: Get \\\"https://ghcr.io/token?scope=repository%3Aflatcar%2Fcalico%2Fnode-driver-registrar%3Apull&service=ghcr.io\\\": dial tcp 140.82.114.33:443: i/o timeout\"" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:47:24.613923 kubelet[1558]: E0913 00:47:24.613875 1558 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\\\"\"" pod="calico-system/csi-node-driver-9tsxc" podUID="8878325d-ae4e-4d2c-a09b-f5dc650071a3" Sep 13 00:47:25.295705 kubelet[1558]: E0913 00:47:25.295632 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:26.236113 kubelet[1558]: E0913 00:47:26.235891 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:26.289975 env[1219]: time="2025-09-13T00:47:26.289921683Z" level=info msg="StopPodSandbox for \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\"" Sep 13 00:47:26.296058 kubelet[1558]: E0913 00:47:26.295989 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.381 [WARNING][2709] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-csi--node--driver--9tsxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8878325d-ae4e-4d2c-a09b-f5dc650071a3", ResourceVersion:"1386", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42", Pod:"csi-node-driver-9tsxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali081c8c8c5ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.381 [INFO][2709] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.381 [INFO][2709] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" iface="eth0" netns="" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.381 [INFO][2709] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.381 [INFO][2709] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.419 [INFO][2716] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.420 [INFO][2716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.420 [INFO][2716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.431 [WARNING][2716] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.431 [INFO][2716] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.433 [INFO][2716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:26.436571 env[1219]: 2025-09-13 00:47:26.435 [INFO][2709] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.437817 env[1219]: time="2025-09-13T00:47:26.437767116Z" level=info msg="TearDown network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\" successfully" Sep 13 00:47:26.437972 env[1219]: time="2025-09-13T00:47:26.437943932Z" level=info msg="StopPodSandbox for \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\" returns successfully" Sep 13 00:47:26.438906 env[1219]: time="2025-09-13T00:47:26.438864896Z" level=info msg="RemovePodSandbox for \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\"" Sep 13 00:47:26.439116 env[1219]: time="2025-09-13T00:47:26.439057049Z" level=info msg="Forcibly stopping sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\"" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.533 [WARNING][2733] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-csi--node--driver--9tsxc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8878325d-ae4e-4d2c-a09b-f5dc650071a3", ResourceVersion:"1386", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42", Pod:"csi-node-driver-9tsxc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali081c8c8c5ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.534 [INFO][2733] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.534 [INFO][2733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" iface="eth0" netns="" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.534 [INFO][2733] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.534 [INFO][2733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.577 [INFO][2740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.577 [INFO][2740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.577 [INFO][2740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.586 [WARNING][2740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.586 [INFO][2740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" HandleID="k8s-pod-network.1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Workload="10.128.0.96-k8s-csi--node--driver--9tsxc-eth0" Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.588 [INFO][2740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:26.594053 env[1219]: 2025-09-13 00:47:26.590 [INFO][2733] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4" Sep 13 00:47:26.595079 env[1219]: time="2025-09-13T00:47:26.595027143Z" level=info msg="TearDown network for sandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\" successfully" Sep 13 00:47:26.600785 env[1219]: time="2025-09-13T00:47:26.600721188Z" level=info msg="RemovePodSandbox \"1e0b0311d025b7a4e5031182bf74b0e9976adaf6022395bddfac2263bfe3b6c4\" returns successfully" Sep 13 00:47:26.601421 env[1219]: time="2025-09-13T00:47:26.601378068Z" level=info msg="StopPodSandbox for \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\"" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.693 [WARNING][2757] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b4644e38-d972-4430-b47f-48d1d59f6d4b", ResourceVersion:"1313", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0", Pod:"nginx-deployment-8587fbcb89-b64pt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie6957f6b8a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.693 [INFO][2757] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.693 [INFO][2757] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" iface="eth0" netns="" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.693 [INFO][2757] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.693 [INFO][2757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.748 [INFO][2764] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.749 [INFO][2764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.749 [INFO][2764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.778 [WARNING][2764] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.778 [INFO][2764] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.780 [INFO][2764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:26.783984 env[1219]: 2025-09-13 00:47:26.782 [INFO][2757] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.785033 env[1219]: time="2025-09-13T00:47:26.784962055Z" level=info msg="TearDown network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\" successfully" Sep 13 00:47:26.785177 env[1219]: time="2025-09-13T00:47:26.785145231Z" level=info msg="StopPodSandbox for \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\" returns successfully" Sep 13 00:47:26.786046 env[1219]: time="2025-09-13T00:47:26.785992501Z" level=info msg="RemovePodSandbox for \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\"" Sep 13 00:47:26.786252 env[1219]: time="2025-09-13T00:47:26.786190338Z" level=info msg="Forcibly stopping sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\"" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.864 [WARNING][2780] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b4644e38-d972-4430-b47f-48d1d59f6d4b", ResourceVersion:"1313", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 46, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0", Pod:"nginx-deployment-8587fbcb89-b64pt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie6957f6b8a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.865 [INFO][2780] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.865 [INFO][2780] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" iface="eth0" netns="" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.865 [INFO][2780] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.865 [INFO][2780] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.912 [INFO][2787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.912 [INFO][2787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.912 [INFO][2787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.921 [WARNING][2787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.922 [INFO][2787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" HandleID="k8s-pod-network.fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Workload="10.128.0.96-k8s-nginx--deployment--8587fbcb89--b64pt-eth0" Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.923 [INFO][2787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:26.928695 env[1219]: 2025-09-13 00:47:26.925 [INFO][2780] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936" Sep 13 00:47:26.928695 env[1219]: time="2025-09-13T00:47:26.927064878Z" level=info msg="TearDown network for sandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\" successfully" Sep 13 00:47:26.930734 env[1219]: time="2025-09-13T00:47:26.930685063Z" level=info msg="RemovePodSandbox \"fa47330ff18fabd848319caa53191a40c15c95f0aa64df66a09252992a0ce936\" returns successfully" Sep 13 00:47:27.297192 kubelet[1558]: E0913 00:47:27.297092 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:27.311825 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3165762107.mount: Deactivated successfully. Sep 13 00:47:28.297329 kubelet[1558]: E0913 00:47:28.297280 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:29.126732 env[1219]: time="2025-09-13T00:47:29.126661646Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:29.129243 env[1219]: time="2025-09-13T00:47:29.129189978Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:29.131604 env[1219]: time="2025-09-13T00:47:29.131535722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:29.133854 env[1219]: time="2025-09-13T00:47:29.133810179Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:29.134921 env[1219]: time="2025-09-13T00:47:29.134865995Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:47:29.138250 env[1219]: time="2025-09-13T00:47:29.138197185Z" level=info msg="CreateContainer within sandbox \"c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 00:47:29.158601 env[1219]: time="2025-09-13T00:47:29.158521452Z" level=info msg="CreateContainer within sandbox \"c3d53dd58692bf93200c33fe1dc1156a97fe7db44125d81d1cb60f5a5204c1e0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5c430be2b44892cbda572f8d4386f55835988c458b047b6aae981e6de71def5a\"" Sep 13 00:47:29.159565 env[1219]: time="2025-09-13T00:47:29.159518722Z" level=info msg="StartContainer for \"5c430be2b44892cbda572f8d4386f55835988c458b047b6aae981e6de71def5a\"" Sep 13 00:47:29.199435 systemd[1]: Started cri-containerd-5c430be2b44892cbda572f8d4386f55835988c458b047b6aae981e6de71def5a.scope. Sep 13 00:47:29.241667 kernel: kauditd_printk_skb: 153 callbacks suppressed Sep 13 00:47:29.241890 kernel: audit: type=1400 audit(1757724449.214:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.284145 kernel: audit: type=1400 audit(1757724449.214:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.284321 kernel: audit: type=1400 audit(1757724449.214:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.298378 kubelet[1558]: E0913 00:47:29.298318 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:29.306092 kernel: audit: type=1400 audit(1757724449.214:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.306314 kernel: audit: type=1400 audit(1757724449.214:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.347153 kernel: audit: type=1400 audit(1757724449.214:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.368109 kernel: audit: type=1400 audit(1757724449.214:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.368266 kernel: audit: type=1400 audit(1757724449.214:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.409364 kernel: audit: type=1400 audit(1757724449.214:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.240000 audit: BPF prog-id=114 op=LOAD Sep 13 00:47:29.432721 kernel: audit: type=1400 audit(1757724449.240:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2620 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:29.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343330626532623434383932636264613537326638643433383666 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2620 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:29.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343330626532623434383932636264613537326638643433383666 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.241000 audit: BPF prog-id=115 op=LOAD Sep 13 00:47:29.241000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000211650 items=0 ppid=2620 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:29.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343330626532623434383932636264613537326638643433383666 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit: BPF prog-id=116 op=LOAD Sep 13 00:47:29.261000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000211698 items=0 ppid=2620 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:29.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343330626532623434383932636264613537326638643433383666 Sep 13 00:47:29.261000 audit: BPF prog-id=116 op=UNLOAD Sep 13 00:47:29.261000 audit: BPF prog-id=115 op=UNLOAD Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:29.261000 audit: BPF prog-id=117 op=LOAD Sep 13 00:47:29.261000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000211aa8 items=0 ppid=2620 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:29.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343330626532623434383932636264613537326638643433383666 Sep 13 00:47:29.436085 env[1219]: time="2025-09-13T00:47:29.433380393Z" level=info msg="StartContainer for \"5c430be2b44892cbda572f8d4386f55835988c458b047b6aae981e6de71def5a\" returns successfully" Sep 13 00:47:30.299058 kubelet[1558]: E0913 00:47:30.298934 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:31.299793 kubelet[1558]: E0913 00:47:31.299706 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:32.300496 kubelet[1558]: E0913 00:47:32.300388 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:33.300896 kubelet[1558]: E0913 00:47:33.300827 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:34.301814 kubelet[1558]: E0913 00:47:34.301741 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:35.302882 kubelet[1558]: E0913 00:47:35.302812 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:36.304069 kubelet[1558]: E0913 00:47:36.303993 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:37.304841 kubelet[1558]: E0913 00:47:37.304763 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:38.305522 kubelet[1558]: E0913 00:47:38.305442 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:38.836000 audit[2859]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:38.843959 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 00:47:38.844095 kernel: audit: type=1325 audit(1757724458.836:727): table=filter:73 family=2 entries=20 op=nft_register_rule pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:38.836000 audit[2859]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff03526dc0 a2=0 a3=7fff03526dac items=0 ppid=1795 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.893117 kernel: audit: type=1300 audit(1757724458.836:727): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff03526dc0 a2=0 a3=7fff03526dac items=0 ppid=1795 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.893392 kernel: audit: type=1327 audit(1757724458.836:727): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:38.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:38.893951 kubelet[1558]: I0913 00:47:38.893882 1558 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-b64pt" podStartSLOduration=25.633574376 podStartE2EDuration="59.893853879s" podCreationTimestamp="2025-09-13 00:46:39 +0000 UTC" firstStartedPulling="2025-09-13 00:46:54.876264118 +0000 UTC m=+29.346867291" lastFinishedPulling="2025-09-13 00:47:29.136543618 +0000 UTC m=+63.607146794" observedRunningTime="2025-09-13 00:47:29.655987461 +0000 UTC m=+64.126590658" watchObservedRunningTime="2025-09-13 00:47:38.893853879 +0000 UTC m=+73.364457076" Sep 13 00:47:38.902831 systemd[1]: Created slice kubepods-besteffort-pod95693091_2e6d_4151_b00b_eead350fe9f9.slice. Sep 13 00:47:38.910000 audit[2859]: NETFILTER_CFG table=nat:74 family=2 entries=26 op=nft_register_rule pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:38.929750 kernel: audit: type=1325 audit(1757724458.910:728): table=nat:74 family=2 entries=26 op=nft_register_rule pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:38.929923 kernel: audit: type=1300 audit(1757724458.910:728): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff03526dc0 a2=0 a3=0 items=0 ppid=1795 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.910000 audit[2859]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff03526dc0 a2=0 a3=0 items=0 ppid=1795 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:38.961493 kernel: audit: type=1327 audit(1757724458.910:728): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:38.986000 audit[2864]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:38.986000 audit[2864]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe9497e510 a2=0 a3=7ffe9497e4fc items=0 ppid=1795 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.037630 kernel: audit: type=1325 audit(1757724458.986:729): table=filter:75 family=2 entries=32 op=nft_register_rule pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:39.037819 kernel: audit: type=1300 audit(1757724458.986:729): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe9497e510 a2=0 a3=7ffe9497e4fc items=0 ppid=1795 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.037886 kernel: audit: type=1327 audit(1757724458.986:729): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:38.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:39.038394 kubelet[1558]: I0913 00:47:39.038353 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/95693091-2e6d-4151-b00b-eead350fe9f9-data\") pod \"nfs-server-provisioner-0\" (UID: \"95693091-2e6d-4151-b00b-eead350fe9f9\") " pod="default/nfs-server-provisioner-0" Sep 13 00:47:39.038665 kubelet[1558]: I0913 00:47:39.038624 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bnvkm\" (UniqueName: \"kubernetes.io/projected/95693091-2e6d-4151-b00b-eead350fe9f9-kube-api-access-bnvkm\") pod \"nfs-server-provisioner-0\" (UID: \"95693091-2e6d-4151-b00b-eead350fe9f9\") " pod="default/nfs-server-provisioner-0" Sep 13 00:47:39.052000 audit[2864]: NETFILTER_CFG table=nat:76 family=2 entries=26 op=nft_register_rule pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:39.052000 audit[2864]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe9497e510 a2=0 a3=0 items=0 ppid=1795 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:39.071513 kernel: audit: type=1325 audit(1757724459.052:730): table=nat:76 family=2 entries=26 op=nft_register_rule pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:39.214957 env[1219]: time="2025-09-13T00:47:39.214868444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:95693091-2e6d-4151-b00b-eead350fe9f9,Namespace:default,Attempt:0,}" Sep 13 00:47:39.306044 kubelet[1558]: E0913 00:47:39.305983 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:39.421037 systemd-networkd[1030]: cali60e51b789ff: Link UP Sep 13 00:47:39.438220 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:47:39.438341 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 00:47:39.438570 systemd-networkd[1030]: cali60e51b789ff: Gained carrier Sep 13 00:47:39.458757 env[1219]: time="2025-09-13T00:47:39.458597695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.299 [INFO][2866] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.96-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 95693091-2e6d-4151-b00b-eead350fe9f9 1437 0 2025-09-13 00:47:38 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.96 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.299 [INFO][2866] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.335 [INFO][2878] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" HandleID="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Workload="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.336 [INFO][2878] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" HandleID="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Workload="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254a0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.96", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 00:47:39.334629231 +0000 UTC"}, Hostname:"10.128.0.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.336 [INFO][2878] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.336 [INFO][2878] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.336 [INFO][2878] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.96' Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.349 [INFO][2878] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.356 [INFO][2878] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.366 [INFO][2878] ipam/ipam.go 511: Trying affinity for 192.168.29.192/26 host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.368 [INFO][2878] ipam/ipam.go 158: Attempting to load block cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.372 [INFO][2878] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.372 [INFO][2878] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.374 [INFO][2878] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.392 [INFO][2878] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.405 [INFO][2878] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.29.195/26] block=192.168.29.192/26 handle="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.405 [INFO][2878] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.29.195/26] handle="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" host="10.128.0.96" Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.405 [INFO][2878] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:39.475074 env[1219]: 2025-09-13 00:47:39.405 [INFO][2878] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.195/26] IPv6=[] ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" HandleID="k8s-pod-network.eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Workload="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:47:39.476806 env[1219]: 2025-09-13 00:47:39.407 [INFO][2866] cni-plugin/k8s.go 418: Populated endpoint ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"95693091-2e6d-4151-b00b-eead350fe9f9", ResourceVersion:"1437", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.29.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:39.476806 env[1219]: 2025-09-13 00:47:39.407 [INFO][2866] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.29.195/32] ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:47:39.476806 env[1219]: 2025-09-13 00:47:39.407 [INFO][2866] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:47:39.476806 env[1219]: 2025-09-13 00:47:39.441 [INFO][2866] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:47:39.477155 env[1219]: 2025-09-13 00:47:39.442 [INFO][2866] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"95693091-2e6d-4151-b00b-eead350fe9f9", ResourceVersion:"1437", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.29.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"b6:44:f1:76:fd:23", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:39.477155 env[1219]: 2025-09-13 00:47:39.467 [INFO][2866] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.96-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:47:39.498555 env[1219]: time="2025-09-13T00:47:39.497461888Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:39.498555 env[1219]: time="2025-09-13T00:47:39.497538644Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:39.498555 env[1219]: time="2025-09-13T00:47:39.497559492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:39.498555 env[1219]: time="2025-09-13T00:47:39.497753241Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c pid=2899 runtime=io.containerd.runc.v2 Sep 13 00:47:39.517000 audit[2912]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:39.517000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffdebfdb290 a2=0 a3=7ffdebfdb27c items=0 ppid=2203 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.517000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:39.536493 systemd[1]: Started cri-containerd-eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c.scope. Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.558000 audit: BPF prog-id=118 op=LOAD Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2899 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616235323737666634343566366665376261343239363964393366 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2899 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616235323737666634343566366665376261343239363964393366 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit: BPF prog-id=119 op=LOAD Sep 13 00:47:39.559000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000216350 items=0 ppid=2899 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616235323737666634343566366665376261343239363964393366 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.559000 audit: BPF prog-id=120 op=LOAD Sep 13 00:47:39.559000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000216398 items=0 ppid=2899 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616235323737666634343566366665376261343239363964393366 Sep 13 00:47:39.560000 audit: BPF prog-id=120 op=UNLOAD Sep 13 00:47:39.560000 audit: BPF prog-id=119 op=UNLOAD Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:39.560000 audit: BPF prog-id=121 op=LOAD Sep 13 00:47:39.560000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002167a8 items=0 ppid=2899 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:39.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616235323737666634343566366665376261343239363964393366 Sep 13 00:47:39.599653 env[1219]: time="2025-09-13T00:47:39.599570332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:95693091-2e6d-4151-b00b-eead350fe9f9,Namespace:default,Attempt:0,} returns sandbox id \"eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c\"" Sep 13 00:47:40.307036 kubelet[1558]: E0913 00:47:40.306950 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:40.812656 env[1219]: time="2025-09-13T00:47:40.812582843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:40.815520 env[1219]: time="2025-09-13T00:47:40.815449976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:40.817671 env[1219]: time="2025-09-13T00:47:40.817628122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:40.819727 env[1219]: time="2025-09-13T00:47:40.819673376Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:40.820457 env[1219]: time="2025-09-13T00:47:40.820413825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:47:40.822604 env[1219]: time="2025-09-13T00:47:40.822564434Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 00:47:40.823599 env[1219]: time="2025-09-13T00:47:40.823545039Z" level=info msg="CreateContainer within sandbox \"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:47:40.844104 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4065319810.mount: Deactivated successfully. Sep 13 00:47:40.853839 env[1219]: time="2025-09-13T00:47:40.853769458Z" level=info msg="CreateContainer within sandbox \"efc2c6203d40fd8d77c77d5a52957c87c7355299dd99a4877de99014a38aef42\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5dd53d615a67a68c0d7000c1b55d1c20d35d587fcd1b51e6e8e9cf139c5e1ab2\"" Sep 13 00:47:40.854699 env[1219]: time="2025-09-13T00:47:40.854646445Z" level=info msg="StartContainer for \"5dd53d615a67a68c0d7000c1b55d1c20d35d587fcd1b51e6e8e9cf139c5e1ab2\"" Sep 13 00:47:40.897750 systemd[1]: run-containerd-runc-k8s.io-5dd53d615a67a68c0d7000c1b55d1c20d35d587fcd1b51e6e8e9cf139c5e1ab2-runc.PyQlAS.mount: Deactivated successfully. Sep 13 00:47:40.904605 systemd[1]: Started cri-containerd-5dd53d615a67a68c0d7000c1b55d1c20d35d587fcd1b51e6e8e9cf139c5e1ab2.scope. Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4bdd81a008 items=0 ppid=2483 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:40.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564643533643631356136376136386330643730303063316235356431 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.926000 audit: BPF prog-id=122 op=LOAD Sep 13 00:47:40.926000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d6278 items=0 ppid=2483 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:40.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564643533643631356136376136386330643730303063316235356431 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.927000 audit: BPF prog-id=123 op=LOAD Sep 13 00:47:40.927000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d62c8 items=0 ppid=2483 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:40.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564643533643631356136376136386330643730303063316235356431 Sep 13 00:47:40.927000 audit: BPF prog-id=123 op=UNLOAD Sep 13 00:47:40.928000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:40.928000 audit: BPF prog-id=124 op=LOAD Sep 13 00:47:40.928000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d6358 items=0 ppid=2483 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:40.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564643533643631356136376136386330643730303063316235356431 Sep 13 00:47:40.965196 env[1219]: time="2025-09-13T00:47:40.965131488Z" level=info msg="StartContainer for \"5dd53d615a67a68c0d7000c1b55d1c20d35d587fcd1b51e6e8e9cf139c5e1ab2\" returns successfully" Sep 13 00:47:41.308157 kubelet[1558]: E0913 00:47:41.308099 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:41.326062 systemd-networkd[1030]: cali60e51b789ff: Gained IPv6LL Sep 13 00:47:41.442569 kubelet[1558]: I0913 00:47:41.442533 1558 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:47:41.442753 kubelet[1558]: I0913 00:47:41.442596 1558 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:47:41.697962 kubelet[1558]: I0913 00:47:41.697870 1558 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9tsxc" podStartSLOduration=27.96027447 podStartE2EDuration="1m15.697841505s" podCreationTimestamp="2025-09-13 00:46:26 +0000 UTC" firstStartedPulling="2025-09-13 00:46:53.084111549 +0000 UTC m=+27.554714730" lastFinishedPulling="2025-09-13 00:47:40.821678567 +0000 UTC m=+75.292281765" observedRunningTime="2025-09-13 00:47:41.696430746 +0000 UTC m=+76.167033943" watchObservedRunningTime="2025-09-13 00:47:41.697841505 +0000 UTC m=+76.168444701" Sep 13 00:47:42.308596 kubelet[1558]: E0913 00:47:42.308496 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:42.992314 systemd[1]: run-containerd-runc-k8s.io-be1f9958382e826a992952317584cea53ee93857f60335f040915b631edea2fe-runc.4UWNVl.mount: Deactivated successfully. Sep 13 00:47:43.309383 kubelet[1558]: E0913 00:47:43.308859 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:43.465356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1800264001.mount: Deactivated successfully. Sep 13 00:47:44.309415 kubelet[1558]: E0913 00:47:44.309356 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:45.310544 kubelet[1558]: E0913 00:47:45.310356 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:45.915872 env[1219]: time="2025-09-13T00:47:45.915799228Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:45.918545 env[1219]: time="2025-09-13T00:47:45.918495905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:45.921460 env[1219]: time="2025-09-13T00:47:45.921416964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:45.923657 env[1219]: time="2025-09-13T00:47:45.923617118Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:45.924585 env[1219]: time="2025-09-13T00:47:45.924532173Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 13 00:47:45.927945 env[1219]: time="2025-09-13T00:47:45.927893366Z" level=info msg="CreateContainer within sandbox \"eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 00:47:45.944920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount180436158.mount: Deactivated successfully. Sep 13 00:47:45.957311 env[1219]: time="2025-09-13T00:47:45.957250031Z" level=info msg="CreateContainer within sandbox \"eaab5277ff445f6fe7ba42969d93fb0175af86948e75155e6ef75cb67fffa51c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c3f73793cf5e0979da8186c092a1631a88e97c88be4e56174f3bbe9c68b29e1e\"" Sep 13 00:47:45.958350 env[1219]: time="2025-09-13T00:47:45.958298700Z" level=info msg="StartContainer for \"c3f73793cf5e0979da8186c092a1631a88e97c88be4e56174f3bbe9c68b29e1e\"" Sep 13 00:47:45.997976 systemd[1]: Started cri-containerd-c3f73793cf5e0979da8186c092a1631a88e97c88be4e56174f3bbe9c68b29e1e.scope. Sep 13 00:47:46.049023 kernel: kauditd_printk_skb: 105 callbacks suppressed Sep 13 00:47:46.049239 kernel: audit: type=1400 audit(1757724466.021:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.091666 kernel: audit: type=1400 audit(1757724466.021:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.091819 kernel: audit: type=1400 audit(1757724466.021:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.112759 kernel: audit: type=1400 audit(1757724466.021:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.112951 kernel: audit: type=1400 audit(1757724466.021:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.154489 kernel: audit: type=1400 audit(1757724466.021:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.154737 kernel: audit: type=1400 audit(1757724466.021:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.178279 env[1219]: time="2025-09-13T00:47:46.178136839Z" level=info msg="StartContainer for \"c3f73793cf5e0979da8186c092a1631a88e97c88be4e56174f3bbe9c68b29e1e\" returns successfully" Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.202516 kernel: audit: type=1400 audit(1757724466.021:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.202700 kernel: audit: type=1400 audit(1757724466.021:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.243537 kernel: audit: type=1400 audit(1757724466.047:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.243723 kubelet[1558]: E0913 00:47:46.243689 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:46.047000 audit: BPF prog-id=125 op=LOAD Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2899 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:46.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663733373933636635653039373964613831383663303932613136 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2899 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:46.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663733373933636635653039373964613831383663303932613136 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit: BPF prog-id=126 op=LOAD Sep 13 00:47:46.048000 audit[3007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000356740 items=0 ppid=2899 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:46.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663733373933636635653039373964613831383663303932613136 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit: BPF prog-id=127 op=LOAD Sep 13 00:47:46.048000 audit[3007]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000356788 items=0 ppid=2899 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:46.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663733373933636635653039373964613831383663303932613136 Sep 13 00:47:46.048000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:47:46.048000 audit: BPF prog-id=126 op=UNLOAD Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { perfmon } for pid=3007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit[3007]: AVC avc: denied { bpf } for pid=3007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:46.048000 audit: BPF prog-id=128 op=LOAD Sep 13 00:47:46.048000 audit[3007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000356b98 items=0 ppid=2899 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:46.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663733373933636635653039373964613831383663303932613136 Sep 13 00:47:46.251000 audit[3033]: AVC avc: denied { search } for pid=3033 comm="rpcbind" name="crypto" dev="proc" ino=23124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:47:46.251000 audit[3033]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f12fe9ab0c0 a2=0 a3=0 items=0 ppid=3018 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 key=(null) Sep 13 00:47:46.251000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 00:47:46.297000 audit[3038]: AVC avc: denied { search } for pid=3038 comm="dbus-daemon" name="crypto" dev="proc" ino=23124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:47:46.297000 audit[3038]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f425ccfa0c0 a2=0 a3=0 items=0 ppid=3018 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 key=(null) Sep 13 00:47:46.297000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:47:46.301000 audit[3039]: AVC avc: denied { watch } for pid=3039 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537449 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c328 tclass=dir permissive=0 Sep 13 00:47:46.301000 audit[3039]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55601d2c1ca0 a2=2c8 a3=7ffe99eacf4c items=0 ppid=3018 pid=3039 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 key=(null) Sep 13 00:47:46.301000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:47:46.306000 audit[3040]: AVC avc: denied { read } for pid=3040 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22446 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 00:47:46.306000 audit[3040]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2c6f8b1320 a1=80000 a2=d a3=7ffc0ad3a440 items=0 ppid=3018 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 key=(null) Sep 13 00:47:46.306000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:47:46.308000 audit[3040]: AVC avc: denied { search } for pid=3040 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:47:46.308000 audit[3040]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2c6ee050c0 a2=0 a3=0 items=0 ppid=3018 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c328 key=(null) Sep 13 00:47:46.308000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:47:46.311411 kubelet[1558]: E0913 00:47:46.311341 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:46.726859 kubelet[1558]: I0913 00:47:46.726764 1558 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.402199382 podStartE2EDuration="8.726735415s" podCreationTimestamp="2025-09-13 00:47:38 +0000 UTC" firstStartedPulling="2025-09-13 00:47:39.60151609 +0000 UTC m=+74.072119277" lastFinishedPulling="2025-09-13 00:47:45.926052141 +0000 UTC m=+80.396655310" observedRunningTime="2025-09-13 00:47:46.725491089 +0000 UTC m=+81.196094287" watchObservedRunningTime="2025-09-13 00:47:46.726735415 +0000 UTC m=+81.197338616" Sep 13 00:47:46.793000 audit[3060]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:46.793000 audit[3060]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc6a3a2310 a2=0 a3=7ffc6a3a22fc items=0 ppid=1795 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:46.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:46.799000 audit[3060]: NETFILTER_CFG table=nat:79 family=2 entries=110 op=nft_register_chain pid=3060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:46.799000 audit[3060]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc6a3a2310 a2=0 a3=7ffc6a3a22fc items=0 ppid=1795 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:46.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:47.312041 kubelet[1558]: E0913 00:47:47.311967 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:48.313303 kubelet[1558]: E0913 00:47:48.313234 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:49.313726 kubelet[1558]: E0913 00:47:49.313647 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:50.314805 kubelet[1558]: E0913 00:47:50.314734 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:51.315255 kubelet[1558]: E0913 00:47:51.315193 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:52.316085 kubelet[1558]: E0913 00:47:52.316016 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:53.317274 kubelet[1558]: E0913 00:47:53.317203 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:54.318144 kubelet[1558]: E0913 00:47:54.318058 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:55.319299 kubelet[1558]: E0913 00:47:55.319223 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:56.319983 kubelet[1558]: E0913 00:47:56.319904 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:57.320198 kubelet[1558]: E0913 00:47:57.320113 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:58.320682 kubelet[1558]: E0913 00:47:58.320623 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:47:59.321893 kubelet[1558]: E0913 00:47:59.321823 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:00.318967 systemd[1]: Created slice kubepods-besteffort-pod2e69ae39_9edd_4e64_937e_1d18a992f0f7.slice. Sep 13 00:48:00.321931 kubelet[1558]: E0913 00:48:00.321899 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:00.479292 kubelet[1558]: I0913 00:48:00.479215 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-68dbcc75-9f77-4b98-95fc-1f6e575805ab\" (UniqueName: \"kubernetes.io/nfs/2e69ae39-9edd-4e64-937e-1d18a992f0f7-pvc-68dbcc75-9f77-4b98-95fc-1f6e575805ab\") pod \"test-pod-1\" (UID: \"2e69ae39-9edd-4e64-937e-1d18a992f0f7\") " pod="default/test-pod-1" Sep 13 00:48:00.479292 kubelet[1558]: I0913 00:48:00.479291 1558 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7vksh\" (UniqueName: \"kubernetes.io/projected/2e69ae39-9edd-4e64-937e-1d18a992f0f7-kube-api-access-7vksh\") pod \"test-pod-1\" (UID: \"2e69ae39-9edd-4e64-937e-1d18a992f0f7\") " pod="default/test-pod-1" Sep 13 00:48:00.597000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.612192 kernel: Failed to create system directory netfs Sep 13 00:48:00.612354 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 00:48:00.612399 kernel: audit: type=1400 audit(1757724480.597:781): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.638407 kernel: Failed to create system directory netfs Sep 13 00:48:00.638596 kernel: audit: type=1400 audit(1757724480.597:781): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.597000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.666523 kernel: Failed to create system directory netfs Sep 13 00:48:00.666669 kernel: audit: type=1400 audit(1757724480.597:781): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.597000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.694731 kernel: Failed to create system directory netfs Sep 13 00:48:00.694891 kernel: audit: type=1400 audit(1757724480.597:781): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.597000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.597000 audit[3073]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e382ba45e0 a1=153bc a2=55e38101e2b0 a3=5 items=0 ppid=50 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.756681 kernel: audit: type=1300 audit(1757724480.597:781): arch=c000003e syscall=175 success=yes exit=0 a0=55e382ba45e0 a1=153bc a2=55e38101e2b0 a3=5 items=0 ppid=50 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.756829 kernel: audit: type=1327 audit(1757724480.597:781): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:48:00.597000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:48:00.773103 kernel: Failed to create system directory fscache Sep 13 00:48:00.773347 kernel: audit: type=1400 audit(1757724480.761:782): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.801554 kernel: Failed to create system directory fscache Sep 13 00:48:00.801737 kernel: audit: type=1400 audit(1757724480.761:782): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.829708 kernel: Failed to create system directory fscache Sep 13 00:48:00.829909 kernel: audit: type=1400 audit(1757724480.761:782): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.858110 kernel: Failed to create system directory fscache Sep 13 00:48:00.858291 kernel: audit: type=1400 audit(1757724480.761:782): avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.884604 kernel: Failed to create system directory fscache Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.891568 kernel: Failed to create system directory fscache Sep 13 00:48:00.891679 kernel: Failed to create system directory fscache Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.902029 kernel: Failed to create system directory fscache Sep 13 00:48:00.902111 kernel: Failed to create system directory fscache Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.912444 kernel: Failed to create system directory fscache Sep 13 00:48:00.912566 kernel: Failed to create system directory fscache Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.922863 kernel: Failed to create system directory fscache Sep 13 00:48:00.922963 kernel: Failed to create system directory fscache Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.761000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.933304 kernel: Failed to create system directory fscache Sep 13 00:48:00.761000 audit[3073]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e382db99c0 a1=4c0fc a2=55e38101e2b0 a3=5 items=0 ppid=50 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.761000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:48:00.938507 kernel: FS-Cache: Loaded Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.990740 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.990871 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.990912 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.001012 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.001122 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.011304 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.011390 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.021558 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.021684 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.031832 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.031971 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.042118 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.047362 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.047509 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.057637 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.057750 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.062832 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.073043 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.073229 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.083308 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.083425 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.093833 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.093957 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.104095 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.104233 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.114369 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.114511 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.124627 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.124743 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.134989 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.135131 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.145236 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.145360 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.155504 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.155604 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.165762 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.165901 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.171506 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.176579 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.186640 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.186763 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.196904 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.197033 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.207147 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.207268 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.217620 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.217734 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.227930 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.228050 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.238113 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.238220 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.243270 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.253463 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.253632 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.263728 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.263841 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.269517 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.279117 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.279240 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.284517 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.294633 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.294764 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.304895 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.305033 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.315142 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.320632 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.326573 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.326717 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.326854 kubelet[1558]: E0913 00:48:01.326176 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.336518 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.336645 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.346758 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.346887 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.357040 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.357149 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.362185 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.367374 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.372506 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.377666 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.382754 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.387935 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.393046 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.398157 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.403329 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.408608 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.418928 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.419075 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.429219 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.429362 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.439453 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.439655 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.444505 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.454854 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.454942 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.465105 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.465256 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.475381 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.475533 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.485619 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.485749 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.495908 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.496083 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.506309 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.506508 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.516587 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.516719 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.526881 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.527031 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.537134 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.537255 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.547418 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.547570 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.552646 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.562853 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.563032 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.573213 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.573362 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.583622 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.583811 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.593859 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.594032 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.599065 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.609337 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.609501 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.619609 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.619808 kernel: Failed to create system directory sunrpc Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:00.966000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.629934 kernel: Failed to create system directory sunrpc Sep 13 00:48:01.649989 kernel: RPC: Registered named UNIX socket transport module. Sep 13 00:48:01.650142 kernel: RPC: Registered udp transport module. Sep 13 00:48:01.650205 kernel: RPC: Registered tcp transport module. Sep 13 00:48:01.654703 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 00:48:00.966000 audit[3073]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e382e05ad0 a1=1a8274 a2=55e38101e2b0 a3=5 items=6 ppid=50 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.966000 audit: CWD cwd="/" Sep 13 00:48:00.966000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:00.966000 audit: PATH item=1 name=(null) inode=23702 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:00.966000 audit: PATH item=2 name=(null) inode=23702 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:00.966000 audit: PATH item=3 name=(null) inode=23703 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:00.966000 audit: PATH item=4 name=(null) inode=23702 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:00.966000 audit: PATH item=5 name=(null) inode=23704 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:00.966000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.723635 kernel: Failed to create system directory nfs Sep 13 00:48:01.723809 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.731325 kernel: Failed to create system directory nfs Sep 13 00:48:01.731453 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.741087 kernel: Failed to create system directory nfs Sep 13 00:48:01.741267 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.750842 kernel: Failed to create system directory nfs Sep 13 00:48:01.750973 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.760654 kernel: Failed to create system directory nfs Sep 13 00:48:01.760808 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.770408 kernel: Failed to create system directory nfs Sep 13 00:48:01.770587 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.780388 kernel: Failed to create system directory nfs Sep 13 00:48:01.780554 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.790139 kernel: Failed to create system directory nfs Sep 13 00:48:01.790269 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.795988 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.804900 kernel: Failed to create system directory nfs Sep 13 00:48:01.805042 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.814680 kernel: Failed to create system directory nfs Sep 13 00:48:01.814812 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.824443 kernel: Failed to create system directory nfs Sep 13 00:48:01.824624 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.834195 kernel: Failed to create system directory nfs Sep 13 00:48:01.834358 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.843952 kernel: Failed to create system directory nfs Sep 13 00:48:01.844107 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.853730 kernel: Failed to create system directory nfs Sep 13 00:48:01.853850 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.858618 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.868386 kernel: Failed to create system directory nfs Sep 13 00:48:01.868543 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.878068 kernel: Failed to create system directory nfs Sep 13 00:48:01.878172 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.887796 kernel: Failed to create system directory nfs Sep 13 00:48:01.887903 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.897647 kernel: Failed to create system directory nfs Sep 13 00:48:01.897756 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.907391 kernel: Failed to create system directory nfs Sep 13 00:48:01.907555 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.917160 kernel: Failed to create system directory nfs Sep 13 00:48:01.917273 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.926896 kernel: Failed to create system directory nfs Sep 13 00:48:01.927000 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.936649 kernel: Failed to create system directory nfs Sep 13 00:48:01.936731 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.946648 kernel: Failed to create system directory nfs Sep 13 00:48:01.946819 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.956388 kernel: Failed to create system directory nfs Sep 13 00:48:01.956547 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.966125 kernel: Failed to create system directory nfs Sep 13 00:48:01.966230 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.975867 kernel: Failed to create system directory nfs Sep 13 00:48:01.975978 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.985797 kernel: Failed to create system directory nfs Sep 13 00:48:01.985907 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.995568 kernel: Failed to create system directory nfs Sep 13 00:48:01.995707 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.005449 kernel: Failed to create system directory nfs Sep 13 00:48:02.005633 kernel: Failed to create system directory nfs Sep 13 00:48:01.704000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.040358 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 00:48:01.704000 audit[3073]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e383026c10 a1=16eb2c a2=55e38101e2b0 a3=5 items=0 ppid=50 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:01.704000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.101799 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.101944 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.101983 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.112048 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.112197 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.121724 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.121861 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.131621 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.131729 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.141580 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.141705 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.151512 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.151642 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.161370 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.161510 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.171335 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.171446 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.181281 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.181392 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.191224 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.191363 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.201237 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.201357 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.211274 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.211366 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.221228 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.221387 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.226179 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.231207 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.236236 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.241208 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.246217 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.256217 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.256367 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.266261 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.266383 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.276255 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.276378 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.286220 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.286364 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.296324 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.296515 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.306272 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.306374 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.311296 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.321197 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.321332 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.326525 kubelet[1558]: E0913 00:48:02.326357 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:02.331184 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.331302 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.341193 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.341347 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.351160 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.351280 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.361193 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.361334 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.371164 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.371321 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.381113 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.381227 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.391058 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.391193 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.401049 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.401197 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.410953 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.411097 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.420912 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.421066 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.430894 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.431012 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.440933 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.441056 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.451025 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.451181 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.461712 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.461837 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.470873 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.470968 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.480868 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.481031 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.485859 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.490822 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.495887 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.500876 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.506007 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.511002 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.516148 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.521135 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.526108 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.531067 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.536061 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.541020 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.546071 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.551126 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.556125 kernel: Failed to create system directory nfs4 Sep 13 00:48:02.076000 audit[3081]: AVC avc: denied { confidentiality } for pid=3081 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.743148 kernel: NFS: Registering the id_resolver key type Sep 13 00:48:02.743353 kernel: Key type id_resolver registered Sep 13 00:48:02.743399 kernel: Key type id_legacy registered Sep 13 00:48:02.076000 audit[3081]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5d2bc03010 a1=2095c4 a2=5597092eb2b0 a3=5 items=0 ppid=50 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.076000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.775139 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.775222 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.775287 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.785389 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.785511 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.795638 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.795731 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.801580 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.806507 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.816366 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.816485 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.826737 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.826833 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.837033 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.837158 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.847316 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.847451 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.857743 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.857863 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.868003 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.868138 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.878275 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.878367 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.888578 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.888661 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.893733 kernel: Failed to create system directory rpcgss Sep 13 00:48:02.760000 audit[3082]: AVC avc: denied { confidentiality } for pid=3082 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:02.760000 audit[3082]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f11094de010 a1=70bf4 a2=55774690f2b0 a3=5 items=0 ppid=50 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.760000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 00:48:02.932041 nfsidmap[3089]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Sep 13 00:48:02.948855 nfsidmap[3090]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Sep 13 00:48:02.968000 audit[1356]: AVC avc: denied { watch_reads } for pid=1356 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:48:02.968000 audit[1356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5595dde0df30 a2=10 a3=3ca72e90ebf05eca items=0 ppid=1 pid=1356 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.968000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:48:02.968000 audit[1356]: AVC avc: denied { watch_reads } for pid=1356 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:48:02.968000 audit[1356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5595dde0df30 a2=10 a3=3ca72e90ebf05eca items=0 ppid=1 pid=1356 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.968000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:48:02.968000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:48:02.968000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:48:02.968000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:48:02.968000 audit[1356]: AVC avc: denied { watch_reads } for pid=1356 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:48:02.968000 audit[1356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5595dde0df30 a2=10 a3=3ca72e90ebf05eca items=0 ppid=1 pid=1356 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.968000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:48:03.027722 env[1219]: time="2025-09-13T00:48:03.024493378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2e69ae39-9edd-4e64-937e-1d18a992f0f7,Namespace:default,Attempt:0,}" Sep 13 00:48:03.189070 systemd-networkd[1030]: cali5ec59c6bf6e: Link UP Sep 13 00:48:03.196768 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:48:03.204562 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 00:48:03.206037 systemd-networkd[1030]: cali5ec59c6bf6e: Gained carrier Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.093 [INFO][3092] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.96-k8s-test--pod--1-eth0 default 2e69ae39-9edd-4e64-937e-1d18a992f0f7 1520 0 2025-09-13 00:47:40 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.96 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.093 [INFO][3092] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-eth0" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.132 [INFO][3105] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" HandleID="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Workload="10.128.0.96-k8s-test--pod--1-eth0" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.133 [INFO][3105] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" HandleID="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Workload="10.128.0.96-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1250), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.96", "pod":"test-pod-1", "timestamp":"2025-09-13 00:48:03.132334767 +0000 UTC"}, Hostname:"10.128.0.96", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.133 [INFO][3105] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.133 [INFO][3105] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.133 [INFO][3105] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.96' Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.144 [INFO][3105] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.151 [INFO][3105] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.159 [INFO][3105] ipam/ipam.go 511: Trying affinity for 192.168.29.192/26 host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.162 [INFO][3105] ipam/ipam.go 158: Attempting to load block cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.169 [INFO][3105] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.169 [INFO][3105] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.171 [INFO][3105] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.175 [INFO][3105] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.182 [INFO][3105] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.29.196/26] block=192.168.29.192/26 handle="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.183 [INFO][3105] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.29.196/26] handle="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" host="10.128.0.96" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.183 [INFO][3105] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.183 [INFO][3105] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.196/26] IPv6=[] ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" HandleID="k8s-pod-network.b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Workload="10.128.0.96-k8s-test--pod--1-eth0" Sep 13 00:48:03.222549 env[1219]: 2025-09-13 00:48:03.185 [INFO][3092] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2e69ae39-9edd-4e64-937e-1d18a992f0f7", ResourceVersion:"1520", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:03.223951 env[1219]: 2025-09-13 00:48:03.185 [INFO][3092] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.29.196/32] ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-eth0" Sep 13 00:48:03.223951 env[1219]: 2025-09-13 00:48:03.185 [INFO][3092] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-eth0" Sep 13 00:48:03.223951 env[1219]: 2025-09-13 00:48:03.207 [INFO][3092] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-eth0" Sep 13 00:48:03.223951 env[1219]: 2025-09-13 00:48:03.207 [INFO][3092] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.96-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2e69ae39-9edd-4e64-937e-1d18a992f0f7", ResourceVersion:"1520", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.96", ContainerID:"b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"66:00:7a:6e:0b:ad", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:03.223951 env[1219]: 2025-09-13 00:48:03.217 [INFO][3092] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.96-k8s-test--pod--1-eth0" Sep 13 00:48:03.242000 audit[3134]: NETFILTER_CFG table=filter:80 family=2 entries=40 op=nft_register_chain pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:03.244539 env[1219]: time="2025-09-13T00:48:03.241262389Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:03.244539 env[1219]: time="2025-09-13T00:48:03.241318341Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:03.244539 env[1219]: time="2025-09-13T00:48:03.241338841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:03.244539 env[1219]: time="2025-09-13T00:48:03.241590425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae pid=3129 runtime=io.containerd.runc.v2 Sep 13 00:48:03.242000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc0b642ae0 a2=0 a3=7ffc0b642acc items=0 ppid=2203 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.242000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:03.272902 systemd[1]: Started cri-containerd-b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae.scope. Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.293000 audit: BPF prog-id=129 op=LOAD Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3129 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237353738316163373334663532356435636436346236366262343861 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3129 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237353738316163373334663532356435636436346236366262343861 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.295000 audit: BPF prog-id=130 op=LOAD Sep 13 00:48:03.295000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001eba40 items=0 ppid=3129 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237353738316163373334663532356435636436346236366262343861 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit: BPF prog-id=131 op=LOAD Sep 13 00:48:03.296000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001eba88 items=0 ppid=3129 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237353738316163373334663532356435636436346236366262343861 Sep 13 00:48:03.296000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:48:03.296000 audit: BPF prog-id=130 op=UNLOAD Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.296000 audit: BPF prog-id=132 op=LOAD Sep 13 00:48:03.296000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001ebe98 items=0 ppid=3129 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237353738316163373334663532356435636436346236366262343861 Sep 13 00:48:03.326744 kubelet[1558]: E0913 00:48:03.326682 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:03.348125 env[1219]: time="2025-09-13T00:48:03.348065407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2e69ae39-9edd-4e64-937e-1d18a992f0f7,Namespace:default,Attempt:0,} returns sandbox id \"b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae\"" Sep 13 00:48:03.351312 env[1219]: time="2025-09-13T00:48:03.351263412Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:48:03.559852 env[1219]: time="2025-09-13T00:48:03.557856485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:03.562265 env[1219]: time="2025-09-13T00:48:03.562218094Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:03.564454 env[1219]: time="2025-09-13T00:48:03.564408267Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:03.566857 env[1219]: time="2025-09-13T00:48:03.566816675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:03.567834 env[1219]: time="2025-09-13T00:48:03.567781669Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:48:03.571749 env[1219]: time="2025-09-13T00:48:03.571698188Z" level=info msg="CreateContainer within sandbox \"b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 00:48:03.593843 env[1219]: time="2025-09-13T00:48:03.593756320Z" level=info msg="CreateContainer within sandbox \"b75781ac734f525d5cd64b66bb48a3eee9590371f809e55d2ad563b67ce759ae\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b4cf4ac8b89ce6daf95822a453dc3863339ae246fb407884ac0bd47a9bee446d\"" Sep 13 00:48:03.594993 env[1219]: time="2025-09-13T00:48:03.594919764Z" level=info msg="StartContainer for \"b4cf4ac8b89ce6daf95822a453dc3863339ae246fb407884ac0bd47a9bee446d\"" Sep 13 00:48:03.620464 systemd[1]: Started cri-containerd-b4cf4ac8b89ce6daf95822a453dc3863339ae246fb407884ac0bd47a9bee446d.scope. Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.639000 audit: BPF prog-id=133 op=LOAD Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3129 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234636634616338623839636536646166393538323261343533646333 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3129 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234636634616338623839636536646166393538323261343533646333 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit: BPF prog-id=134 op=LOAD Sep 13 00:48:03.640000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0002d1ee0 items=0 ppid=3129 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234636634616338623839636536646166393538323261343533646333 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.640000 audit: BPF prog-id=135 op=LOAD Sep 13 00:48:03.640000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0002d1f28 items=0 ppid=3129 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234636634616338623839636536646166393538323261343533646333 Sep 13 00:48:03.641000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:48:03.641000 audit: BPF prog-id=134 op=UNLOAD Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.641000 audit: BPF prog-id=136 op=LOAD Sep 13 00:48:03.641000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0003ac338 items=0 ppid=3129 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234636634616338623839636536646166393538323261343533646333 Sep 13 00:48:03.666802 env[1219]: time="2025-09-13T00:48:03.666734290Z" level=info msg="StartContainer for \"b4cf4ac8b89ce6daf95822a453dc3863339ae246fb407884ac0bd47a9bee446d\" returns successfully" Sep 13 00:48:04.327692 kubelet[1558]: E0913 00:48:04.327614 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:04.363804 systemd-networkd[1030]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 00:48:05.328005 kubelet[1558]: E0913 00:48:05.327934 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:06.236943 kubelet[1558]: E0913 00:48:06.236869 1558 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:06.328977 kubelet[1558]: E0913 00:48:06.328909 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:07.329926 kubelet[1558]: E0913 00:48:07.329857 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:08.330691 kubelet[1558]: E0913 00:48:08.330629 1558 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"