Sep 13 01:36:10.039743 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Sep 13 01:36:10.039763 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 12 23:05:37 -00 2025 Sep 13 01:36:10.039771 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Sep 13 01:36:10.039777 kernel: printk: bootconsole [pl11] enabled Sep 13 01:36:10.039782 kernel: efi: EFI v2.70 by EDK II Sep 13 01:36:10.039788 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3761cf98 Sep 13 01:36:10.039795 kernel: random: crng init done Sep 13 01:36:10.039800 kernel: ACPI: Early table checksum verification disabled Sep 13 01:36:10.039806 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Sep 13 01:36:10.039811 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039817 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039822 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 13 01:36:10.039828 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039834 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039840 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039846 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039852 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039859 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039864 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Sep 13 01:36:10.039870 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:36:10.039876 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Sep 13 01:36:10.039882 kernel: NUMA: Failed to initialise from firmware Sep 13 01:36:10.039887 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Sep 13 01:36:10.039893 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Sep 13 01:36:10.039899 kernel: Zone ranges: Sep 13 01:36:10.039905 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Sep 13 01:36:10.039910 kernel: DMA32 empty Sep 13 01:36:10.039916 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Sep 13 01:36:10.039922 kernel: Movable zone start for each node Sep 13 01:36:10.039928 kernel: Early memory node ranges Sep 13 01:36:10.039934 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Sep 13 01:36:10.039940 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Sep 13 01:36:10.039945 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Sep 13 01:36:10.039951 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Sep 13 01:36:10.039957 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Sep 13 01:36:10.039962 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Sep 13 01:36:10.039968 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Sep 13 01:36:10.039973 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Sep 13 01:36:10.039979 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Sep 13 01:36:10.039985 kernel: psci: probing for conduit method from ACPI. Sep 13 01:36:10.039994 kernel: psci: PSCIv1.1 detected in firmware. Sep 13 01:36:10.040000 kernel: psci: Using standard PSCI v0.2 function IDs Sep 13 01:36:10.040006 kernel: psci: MIGRATE_INFO_TYPE not supported. Sep 13 01:36:10.040012 kernel: psci: SMC Calling Convention v1.4 Sep 13 01:36:10.040018 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Sep 13 01:36:10.040025 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Sep 13 01:36:10.040031 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Sep 13 01:36:10.040037 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Sep 13 01:36:10.040044 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 13 01:36:10.040050 kernel: Detected PIPT I-cache on CPU0 Sep 13 01:36:10.040056 kernel: CPU features: detected: GIC system register CPU interface Sep 13 01:36:10.040062 kernel: CPU features: detected: Hardware dirty bit management Sep 13 01:36:10.040067 kernel: CPU features: detected: Spectre-BHB Sep 13 01:36:10.040073 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 13 01:36:10.040079 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 13 01:36:10.040085 kernel: CPU features: detected: ARM erratum 1418040 Sep 13 01:36:10.040092 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Sep 13 01:36:10.040099 kernel: CPU features: detected: SSBS not fully self-synchronizing Sep 13 01:36:10.040105 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Sep 13 01:36:10.040111 kernel: Policy zone: Normal Sep 13 01:36:10.040118 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 01:36:10.040124 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 01:36:10.040131 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 01:36:10.040137 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 01:36:10.040143 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 01:36:10.040149 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Sep 13 01:36:10.040155 kernel: Memory: 3986880K/4194160K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 207280K reserved, 0K cma-reserved) Sep 13 01:36:10.040163 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 01:36:10.040169 kernel: trace event string verifier disabled Sep 13 01:36:10.040175 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 13 01:36:10.040181 kernel: rcu: RCU event tracing is enabled. Sep 13 01:36:10.040188 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 01:36:10.040194 kernel: Trampoline variant of Tasks RCU enabled. Sep 13 01:36:10.040200 kernel: Tracing variant of Tasks RCU enabled. Sep 13 01:36:10.040206 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 01:36:10.040213 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 01:36:10.040219 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 13 01:36:10.040225 kernel: GICv3: 960 SPIs implemented Sep 13 01:36:10.040232 kernel: GICv3: 0 Extended SPIs implemented Sep 13 01:36:10.040238 kernel: GICv3: Distributor has no Range Selector support Sep 13 01:36:10.040244 kernel: Root IRQ handler: gic_handle_irq Sep 13 01:36:10.040250 kernel: GICv3: 16 PPIs implemented Sep 13 01:36:10.040256 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Sep 13 01:36:10.040262 kernel: ITS: No ITS available, not enabling LPIs Sep 13 01:36:10.040268 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 13 01:36:10.040274 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Sep 13 01:36:10.040280 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Sep 13 01:36:10.040287 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Sep 13 01:36:10.040293 kernel: Console: colour dummy device 80x25 Sep 13 01:36:10.040301 kernel: printk: console [tty1] enabled Sep 13 01:36:10.040307 kernel: ACPI: Core revision 20210730 Sep 13 01:36:10.040314 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Sep 13 01:36:10.040321 kernel: pid_max: default: 32768 minimum: 301 Sep 13 01:36:10.040347 kernel: LSM: Security Framework initializing Sep 13 01:36:10.040355 kernel: SELinux: Initializing. Sep 13 01:36:10.040362 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 01:36:10.040368 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 01:36:10.040374 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Sep 13 01:36:10.040382 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 Sep 13 01:36:10.040388 kernel: rcu: Hierarchical SRCU implementation. Sep 13 01:36:10.040394 kernel: Remapping and enabling EFI services. Sep 13 01:36:10.040400 kernel: smp: Bringing up secondary CPUs ... Sep 13 01:36:10.040406 kernel: Detected PIPT I-cache on CPU1 Sep 13 01:36:10.040413 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Sep 13 01:36:10.040419 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 13 01:36:10.040425 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Sep 13 01:36:10.040431 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 01:36:10.040438 kernel: SMP: Total of 2 processors activated. Sep 13 01:36:10.040445 kernel: CPU features: detected: 32-bit EL0 Support Sep 13 01:36:10.040451 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Sep 13 01:36:10.040458 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Sep 13 01:36:10.040464 kernel: CPU features: detected: CRC32 instructions Sep 13 01:36:10.040471 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Sep 13 01:36:10.040477 kernel: CPU features: detected: LSE atomic instructions Sep 13 01:36:10.040483 kernel: CPU features: detected: Privileged Access Never Sep 13 01:36:10.040489 kernel: CPU: All CPU(s) started at EL1 Sep 13 01:36:10.040497 kernel: alternatives: patching kernel code Sep 13 01:36:10.040503 kernel: devtmpfs: initialized Sep 13 01:36:10.040513 kernel: KASLR enabled Sep 13 01:36:10.040521 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 01:36:10.040528 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 01:36:10.040534 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 01:36:10.040541 kernel: SMBIOS 3.1.0 present. Sep 13 01:36:10.040547 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 13 01:36:10.040554 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 01:36:10.040561 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 13 01:36:10.040569 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 13 01:36:10.040576 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 13 01:36:10.040582 kernel: audit: initializing netlink subsys (disabled) Sep 13 01:36:10.040589 kernel: audit: type=2000 audit(0.092:1): state=initialized audit_enabled=0 res=1 Sep 13 01:36:10.040595 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 01:36:10.040602 kernel: cpuidle: using governor menu Sep 13 01:36:10.040608 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 13 01:36:10.040616 kernel: ASID allocator initialised with 32768 entries Sep 13 01:36:10.040622 kernel: ACPI: bus type PCI registered Sep 13 01:36:10.040629 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 01:36:10.040636 kernel: Serial: AMBA PL011 UART driver Sep 13 01:36:10.040642 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 01:36:10.040649 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 13 01:36:10.040656 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 01:36:10.040662 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 13 01:36:10.040669 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 01:36:10.040676 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 13 01:36:10.040683 kernel: ACPI: Added _OSI(Module Device) Sep 13 01:36:10.040690 kernel: ACPI: Added _OSI(Processor Device) Sep 13 01:36:10.040697 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 01:36:10.040703 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 01:36:10.040717 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 01:36:10.040724 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 01:36:10.040730 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 01:36:10.040737 kernel: ACPI: Interpreter enabled Sep 13 01:36:10.040745 kernel: ACPI: Using GIC for interrupt routing Sep 13 01:36:10.040751 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Sep 13 01:36:10.040758 kernel: printk: console [ttyAMA0] enabled Sep 13 01:36:10.040764 kernel: printk: bootconsole [pl11] disabled Sep 13 01:36:10.040771 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Sep 13 01:36:10.040777 kernel: iommu: Default domain type: Translated Sep 13 01:36:10.040784 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 13 01:36:10.040790 kernel: vgaarb: loaded Sep 13 01:36:10.040797 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 01:36:10.040804 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 01:36:10.040811 kernel: PTP clock support registered Sep 13 01:36:10.040817 kernel: Registered efivars operations Sep 13 01:36:10.040824 kernel: No ACPI PMU IRQ for CPU0 Sep 13 01:36:10.040830 kernel: No ACPI PMU IRQ for CPU1 Sep 13 01:36:10.040837 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 13 01:36:10.040843 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 01:36:10.040850 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 01:36:10.040856 kernel: pnp: PnP ACPI init Sep 13 01:36:10.040864 kernel: pnp: PnP ACPI: found 0 devices Sep 13 01:36:10.040871 kernel: NET: Registered PF_INET protocol family Sep 13 01:36:10.040877 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 01:36:10.040884 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 13 01:36:10.040891 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 01:36:10.040897 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 01:36:10.040904 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 13 01:36:10.040910 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 13 01:36:10.040917 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 01:36:10.040925 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 01:36:10.040932 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 01:36:10.040938 kernel: PCI: CLS 0 bytes, default 64 Sep 13 01:36:10.040945 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Sep 13 01:36:10.040951 kernel: kvm [1]: HYP mode not available Sep 13 01:36:10.040958 kernel: Initialise system trusted keyrings Sep 13 01:36:10.040964 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 13 01:36:10.040971 kernel: Key type asymmetric registered Sep 13 01:36:10.040977 kernel: Asymmetric key parser 'x509' registered Sep 13 01:36:10.040985 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 01:36:10.040991 kernel: io scheduler mq-deadline registered Sep 13 01:36:10.040998 kernel: io scheduler kyber registered Sep 13 01:36:10.041005 kernel: io scheduler bfq registered Sep 13 01:36:10.041011 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 01:36:10.041018 kernel: thunder_xcv, ver 1.0 Sep 13 01:36:10.041024 kernel: thunder_bgx, ver 1.0 Sep 13 01:36:10.041031 kernel: nicpf, ver 1.0 Sep 13 01:36:10.041037 kernel: nicvf, ver 1.0 Sep 13 01:36:10.041167 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 13 01:36:10.041232 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-13T01:36:09 UTC (1757727369) Sep 13 01:36:10.041241 kernel: efifb: probing for efifb Sep 13 01:36:10.041248 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 01:36:10.041255 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 01:36:10.041261 kernel: efifb: scrolling: redraw Sep 13 01:36:10.041268 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 01:36:10.041274 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 01:36:10.041283 kernel: fb0: EFI VGA frame buffer device Sep 13 01:36:10.041290 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Sep 13 01:36:10.041296 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 01:36:10.041303 kernel: NET: Registered PF_INET6 protocol family Sep 13 01:36:10.041309 kernel: Segment Routing with IPv6 Sep 13 01:36:10.041316 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 01:36:10.041322 kernel: NET: Registered PF_PACKET protocol family Sep 13 01:36:10.051383 kernel: Key type dns_resolver registered Sep 13 01:36:10.051406 kernel: registered taskstats version 1 Sep 13 01:36:10.051422 kernel: Loading compiled-in X.509 certificates Sep 13 01:36:10.051430 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 47ac98e9306f36eebe4291d409359a5a5d0c2b9c' Sep 13 01:36:10.051437 kernel: Key type .fscrypt registered Sep 13 01:36:10.051444 kernel: Key type fscrypt-provisioning registered Sep 13 01:36:10.051451 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 01:36:10.051458 kernel: ima: Allocated hash algorithm: sha1 Sep 13 01:36:10.051464 kernel: ima: No architecture policies found Sep 13 01:36:10.051471 kernel: clk: Disabling unused clocks Sep 13 01:36:10.051478 kernel: Freeing unused kernel memory: 36416K Sep 13 01:36:10.051486 kernel: Run /init as init process Sep 13 01:36:10.051493 kernel: with arguments: Sep 13 01:36:10.051500 kernel: /init Sep 13 01:36:10.051506 kernel: with environment: Sep 13 01:36:10.051512 kernel: HOME=/ Sep 13 01:36:10.051519 kernel: TERM=linux Sep 13 01:36:10.051526 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 01:36:10.051536 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:36:10.051547 systemd[1]: Detected virtualization microsoft. Sep 13 01:36:10.051555 systemd[1]: Detected architecture arm64. Sep 13 01:36:10.051562 systemd[1]: Running in initrd. Sep 13 01:36:10.051569 systemd[1]: No hostname configured, using default hostname. Sep 13 01:36:10.051576 systemd[1]: Hostname set to . Sep 13 01:36:10.051583 systemd[1]: Initializing machine ID from random generator. Sep 13 01:36:10.051590 systemd[1]: Queued start job for default target initrd.target. Sep 13 01:36:10.051597 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:36:10.051605 systemd[1]: Reached target cryptsetup.target. Sep 13 01:36:10.051613 systemd[1]: Reached target paths.target. Sep 13 01:36:10.051620 systemd[1]: Reached target slices.target. Sep 13 01:36:10.051627 systemd[1]: Reached target swap.target. Sep 13 01:36:10.051634 systemd[1]: Reached target timers.target. Sep 13 01:36:10.051642 systemd[1]: Listening on iscsid.socket. Sep 13 01:36:10.051649 systemd[1]: Listening on iscsiuio.socket. Sep 13 01:36:10.051656 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 01:36:10.051664 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 01:36:10.051672 systemd[1]: Listening on systemd-journald.socket. Sep 13 01:36:10.051679 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:36:10.051686 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:36:10.051693 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:36:10.051700 systemd[1]: Reached target sockets.target. Sep 13 01:36:10.051707 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:36:10.051714 systemd[1]: Finished network-cleanup.service. Sep 13 01:36:10.051722 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 01:36:10.051730 systemd[1]: Starting systemd-journald.service... Sep 13 01:36:10.051737 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:36:10.051744 systemd[1]: Starting systemd-resolved.service... Sep 13 01:36:10.051751 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 01:36:10.051764 systemd-journald[276]: Journal started Sep 13 01:36:10.051833 systemd-journald[276]: Runtime Journal (/run/log/journal/5a20e431f9d0498cbfde758f537f2245) is 8.0M, max 78.5M, 70.5M free. Sep 13 01:36:10.031850 systemd-modules-load[277]: Inserted module 'overlay' Sep 13 01:36:10.080359 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 01:36:10.081352 systemd[1]: Started systemd-journald.service. Sep 13 01:36:10.096111 kernel: Bridge firewalling registered Sep 13 01:36:10.096268 systemd-modules-load[277]: Inserted module 'br_netfilter' Sep 13 01:36:10.151896 kernel: audit: type=1130 audit(1757727370.102:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.151924 kernel: SCSI subsystem initialized Sep 13 01:36:10.151933 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 01:36:10.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.127679 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:36:10.184650 kernel: audit: type=1130 audit(1757727370.157:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.184676 kernel: device-mapper: uevent: version 1.0.3 Sep 13 01:36:10.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.131163 systemd-resolved[278]: Positive Trust Anchors: Sep 13 01:36:10.221309 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 01:36:10.221347 kernel: audit: type=1130 audit(1757727370.202:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.131170 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:36:10.131200 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:36:10.285035 kernel: audit: type=1130 audit(1757727370.236:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.133409 systemd-resolved[278]: Defaulting to hostname 'linux'. Sep 13 01:36:10.157536 systemd[1]: Started systemd-resolved.service. Sep 13 01:36:10.203292 systemd-modules-load[277]: Inserted module 'dm_multipath' Sep 13 01:36:10.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.222546 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 01:36:10.353662 kernel: audit: type=1130 audit(1757727370.297:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.353689 kernel: audit: type=1130 audit(1757727370.306:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.287088 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:36:10.297863 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 01:36:10.306746 systemd[1]: Reached target nss-lookup.target. Sep 13 01:36:10.353982 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 01:36:10.414950 kernel: audit: type=1130 audit(1757727370.392:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.361112 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:36:10.440530 kernel: audit: type=1130 audit(1757727370.420:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.370724 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 01:36:10.387507 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:36:10.411559 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 01:36:10.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.446345 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 01:36:10.481368 kernel: audit: type=1130 audit(1757727370.454:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.480736 systemd[1]: Starting dracut-cmdline.service... Sep 13 01:36:10.493480 dracut-cmdline[299]: dracut-dracut-053 Sep 13 01:36:10.497444 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 01:36:10.563366 kernel: Loading iSCSI transport class v2.0-870. Sep 13 01:36:10.579361 kernel: iscsi: registered transport (tcp) Sep 13 01:36:10.600055 kernel: iscsi: registered transport (qla4xxx) Sep 13 01:36:10.600137 kernel: QLogic iSCSI HBA Driver Sep 13 01:36:10.638569 systemd[1]: Finished dracut-cmdline.service. Sep 13 01:36:10.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:10.644387 systemd[1]: Starting dracut-pre-udev.service... Sep 13 01:36:10.701375 kernel: raid6: neonx8 gen() 13719 MB/s Sep 13 01:36:10.723358 kernel: raid6: neonx8 xor() 10770 MB/s Sep 13 01:36:10.744355 kernel: raid6: neonx4 gen() 13526 MB/s Sep 13 01:36:10.767359 kernel: raid6: neonx4 xor() 11264 MB/s Sep 13 01:36:10.789387 kernel: raid6: neonx2 gen() 12949 MB/s Sep 13 01:36:10.810382 kernel: raid6: neonx2 xor() 10226 MB/s Sep 13 01:36:10.832355 kernel: raid6: neonx1 gen() 10532 MB/s Sep 13 01:36:10.853354 kernel: raid6: neonx1 xor() 8786 MB/s Sep 13 01:36:10.874350 kernel: raid6: int64x8 gen() 6266 MB/s Sep 13 01:36:10.898371 kernel: raid6: int64x8 xor() 3535 MB/s Sep 13 01:36:10.919375 kernel: raid6: int64x4 gen() 7217 MB/s Sep 13 01:36:10.941369 kernel: raid6: int64x4 xor() 3852 MB/s Sep 13 01:36:10.964375 kernel: raid6: int64x2 gen() 6145 MB/s Sep 13 01:36:10.986349 kernel: raid6: int64x2 xor() 3319 MB/s Sep 13 01:36:11.010356 kernel: raid6: int64x1 gen() 5041 MB/s Sep 13 01:36:11.037969 kernel: raid6: int64x1 xor() 2646 MB/s Sep 13 01:36:11.038038 kernel: raid6: using algorithm neonx8 gen() 13719 MB/s Sep 13 01:36:11.038048 kernel: raid6: .... xor() 10770 MB/s, rmw enabled Sep 13 01:36:11.043812 kernel: raid6: using neon recovery algorithm Sep 13 01:36:11.071465 kernel: xor: measuring software checksum speed Sep 13 01:36:11.071519 kernel: 8regs : 17166 MB/sec Sep 13 01:36:11.076508 kernel: 32regs : 20686 MB/sec Sep 13 01:36:11.081278 kernel: arm64_neon : 27524 MB/sec Sep 13 01:36:11.081360 kernel: xor: using function: arm64_neon (27524 MB/sec) Sep 13 01:36:11.148397 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 13 01:36:11.160262 systemd[1]: Finished dracut-pre-udev.service. Sep 13 01:36:11.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:11.171000 audit: BPF prog-id=7 op=LOAD Sep 13 01:36:11.172000 audit: BPF prog-id=8 op=LOAD Sep 13 01:36:11.173060 systemd[1]: Starting systemd-udevd.service... Sep 13 01:36:11.191084 systemd-udevd[475]: Using default interface naming scheme 'v252'. Sep 13 01:36:11.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:11.198592 systemd[1]: Started systemd-udevd.service. Sep 13 01:36:11.212093 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 01:36:11.229063 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Sep 13 01:36:11.261872 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 01:36:11.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:11.269701 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:36:11.305613 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:36:11.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:11.375628 kernel: hv_vmbus: Vmbus version:5.3 Sep 13 01:36:11.384371 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 01:36:11.410896 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Sep 13 01:36:11.410969 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 01:36:11.410978 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 01:36:11.431362 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Sep 13 01:36:11.431418 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 01:36:11.438826 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 01:36:11.446360 kernel: scsi host1: storvsc_host_t Sep 13 01:36:11.446597 kernel: scsi host0: storvsc_host_t Sep 13 01:36:11.451339 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 01:36:11.465999 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Sep 13 01:36:11.487913 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 01:36:11.511105 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 01:36:11.511120 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 01:36:11.523832 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 01:36:11.523942 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 01:36:11.524020 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 01:36:11.524098 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 01:36:11.524176 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 01:36:11.524259 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:36:11.524276 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 01:36:11.534351 kernel: hv_netvsc 002248bd-a1df-0022-48bd-a1df002248bd eth0: VF slot 1 added Sep 13 01:36:11.543385 kernel: hv_vmbus: registering driver hv_pci Sep 13 01:36:11.556376 kernel: hv_pci c508b522-82c4-46ff-8553-1e63313bc5a6: PCI VMBus probing: Using version 0x10004 Sep 13 01:36:11.634601 kernel: hv_pci c508b522-82c4-46ff-8553-1e63313bc5a6: PCI host bridge to bus 82c4:00 Sep 13 01:36:11.634717 kernel: pci_bus 82c4:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Sep 13 01:36:11.634820 kernel: pci_bus 82c4:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 01:36:11.634902 kernel: pci 82c4:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 01:36:11.635021 kernel: pci 82c4:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 13 01:36:11.635110 kernel: pci 82c4:00:02.0: enabling Extended Tags Sep 13 01:36:11.635190 kernel: pci 82c4:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 82c4:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 01:36:11.635277 kernel: pci_bus 82c4:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 01:36:11.635397 kernel: pci 82c4:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 13 01:36:11.673644 kernel: mlx5_core 82c4:00:02.0: enabling device (0000 -> 0002) Sep 13 01:36:11.903593 kernel: mlx5_core 82c4:00:02.0: firmware version: 16.30.1284 Sep 13 01:36:11.903719 kernel: mlx5_core 82c4:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 01:36:11.903815 kernel: hv_netvsc 002248bd-a1df-0022-48bd-a1df002248bd eth0: VF registering: eth1 Sep 13 01:36:11.903904 kernel: mlx5_core 82c4:00:02.0 eth1: joined to eth0 Sep 13 01:36:11.912352 kernel: mlx5_core 82c4:00:02.0 enP33476s1: renamed from eth1 Sep 13 01:36:12.087355 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (543) Sep 13 01:36:12.099972 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 01:36:12.115974 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:36:12.354812 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 01:36:12.385088 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 01:36:12.391913 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 01:36:12.408546 systemd[1]: Starting disk-uuid.service... Sep 13 01:36:12.435354 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:36:13.457255 disk-uuid[606]: The operation has completed successfully. Sep 13 01:36:13.462963 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:36:13.525765 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 01:36:13.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:13.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:13.525863 systemd[1]: Finished disk-uuid.service. Sep 13 01:36:13.544611 systemd[1]: Starting verity-setup.service... Sep 13 01:36:13.586388 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 13 01:36:14.019326 systemd[1]: Found device dev-mapper-usr.device. Sep 13 01:36:14.026341 systemd[1]: Mounting sysusr-usr.mount... Sep 13 01:36:14.039384 systemd[1]: Finished verity-setup.service. Sep 13 01:36:14.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.052936 kernel: kauditd_printk_skb: 9 callbacks suppressed Sep 13 01:36:14.052974 kernel: audit: type=1130 audit(1757727374.043:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.130373 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 01:36:14.131111 systemd[1]: Mounted sysusr-usr.mount. Sep 13 01:36:14.139640 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 01:36:14.140556 systemd[1]: Starting ignition-setup.service... Sep 13 01:36:14.153016 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 01:36:14.189845 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:36:14.189907 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:36:14.194754 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:36:14.256156 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 01:36:14.292779 kernel: audit: type=1130 audit(1757727374.261:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.292810 kernel: audit: type=1334 audit(1757727374.265:22): prog-id=9 op=LOAD Sep 13 01:36:14.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.265000 audit: BPF prog-id=9 op=LOAD Sep 13 01:36:14.266215 systemd[1]: Starting systemd-networkd.service... Sep 13 01:36:14.315780 systemd-networkd[873]: lo: Link UP Sep 13 01:36:14.315793 systemd-networkd[873]: lo: Gained carrier Sep 13 01:36:14.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.316250 systemd-networkd[873]: Enumeration completed Sep 13 01:36:14.356569 kernel: audit: type=1130 audit(1757727374.325:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.320936 systemd[1]: Started systemd-networkd.service. Sep 13 01:36:14.321616 systemd-networkd[873]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:36:14.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.346510 systemd[1]: Reached target network.target. Sep 13 01:36:14.406628 kernel: audit: type=1130 audit(1757727374.371:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.353310 systemd[1]: Starting iscsiuio.service... Sep 13 01:36:14.410783 iscsid[880]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:36:14.410783 iscsid[880]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 13 01:36:14.410783 iscsid[880]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 01:36:14.410783 iscsid[880]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 01:36:14.410783 iscsid[880]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 01:36:14.410783 iscsid[880]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:36:14.410783 iscsid[880]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 01:36:14.539633 kernel: audit: type=1130 audit(1757727374.414:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.539659 kernel: audit: type=1130 audit(1757727374.475:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.367531 systemd[1]: Started iscsiuio.service. Sep 13 01:36:14.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.397171 systemd[1]: Starting iscsid.service... Sep 13 01:36:14.567475 kernel: audit: type=1130 audit(1757727374.543:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.405918 systemd[1]: Started iscsid.service. Sep 13 01:36:14.416764 systemd[1]: Starting dracut-initqueue.service... Sep 13 01:36:14.457906 systemd[1]: Finished dracut-initqueue.service. Sep 13 01:36:14.497860 systemd[1]: Reached target remote-fs-pre.target. Sep 13 01:36:14.502588 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:36:14.507605 systemd[1]: Reached target remote-fs.target. Sep 13 01:36:14.520629 systemd[1]: Starting dracut-pre-mount.service... Sep 13 01:36:14.525281 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 01:36:14.534890 systemd[1]: Finished dracut-pre-mount.service. Sep 13 01:36:14.618443 kernel: mlx5_core 82c4:00:02.0 enP33476s1: Link up Sep 13 01:36:14.618672 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 01:36:14.671203 kernel: hv_netvsc 002248bd-a1df-0022-48bd-a1df002248bd eth0: Data path switched to VF: enP33476s1 Sep 13 01:36:14.671372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:36:14.672113 systemd-networkd[873]: enP33476s1: Link UP Sep 13 01:36:14.672203 systemd-networkd[873]: eth0: Link UP Sep 13 01:36:14.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.672373 systemd-networkd[873]: eth0: Gained carrier Sep 13 01:36:14.682426 systemd[1]: Finished ignition-setup.service. Sep 13 01:36:14.708855 systemd-networkd[873]: enP33476s1: Gained carrier Sep 13 01:36:14.717996 kernel: audit: type=1130 audit(1757727374.687:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:14.716579 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 01:36:14.729433 systemd-networkd[873]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:36:16.583534 systemd-networkd[873]: eth0: Gained IPv6LL Sep 13 01:36:18.146946 ignition[900]: Ignition 2.14.0 Sep 13 01:36:18.147748 ignition[900]: Stage: fetch-offline Sep 13 01:36:18.147848 ignition[900]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:36:18.147878 ignition[900]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:36:18.234970 ignition[900]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:36:18.235160 ignition[900]: parsed url from cmdline: "" Sep 13 01:36:18.235165 ignition[900]: no config URL provided Sep 13 01:36:18.235170 ignition[900]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 01:36:18.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:18.242045 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 01:36:18.278631 kernel: audit: type=1130 audit(1757727378.250:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:18.235179 ignition[900]: no config at "/usr/lib/ignition/user.ign" Sep 13 01:36:18.272348 systemd[1]: Starting ignition-fetch.service... Sep 13 01:36:18.235185 ignition[900]: failed to fetch config: resource requires networking Sep 13 01:36:18.235581 ignition[900]: Ignition finished successfully Sep 13 01:36:18.292176 ignition[906]: Ignition 2.14.0 Sep 13 01:36:18.292185 ignition[906]: Stage: fetch Sep 13 01:36:18.292317 ignition[906]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:36:18.292381 ignition[906]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:36:18.295909 ignition[906]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:36:18.296625 ignition[906]: parsed url from cmdline: "" Sep 13 01:36:18.296634 ignition[906]: no config URL provided Sep 13 01:36:18.296642 ignition[906]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 01:36:18.296655 ignition[906]: no config at "/usr/lib/ignition/user.ign" Sep 13 01:36:18.296701 ignition[906]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 01:36:18.445126 ignition[906]: GET result: OK Sep 13 01:36:18.445211 ignition[906]: config has been read from IMDS userdata Sep 13 01:36:18.447559 unknown[906]: fetched base config from "system" Sep 13 01:36:18.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:18.445242 ignition[906]: parsing config with SHA512: 41c4b47478ffa6bc11e04c2f73637fe69687ef7aa8787f13a18b5ada3ea22ae39d33eca3d58279c95cf406095f84068f5167947da93672973c0cdccd7c3c5b5d Sep 13 01:36:18.447567 unknown[906]: fetched base config from "system" Sep 13 01:36:18.447957 ignition[906]: fetch: fetch complete Sep 13 01:36:18.447573 unknown[906]: fetched user config from "azure" Sep 13 01:36:18.447961 ignition[906]: fetch: fetch passed Sep 13 01:36:18.449616 systemd[1]: Finished ignition-fetch.service. Sep 13 01:36:18.448012 ignition[906]: Ignition finished successfully Sep 13 01:36:18.459312 systemd[1]: Starting ignition-kargs.service... Sep 13 01:36:18.481224 ignition[913]: Ignition 2.14.0 Sep 13 01:36:18.496185 systemd[1]: Finished ignition-kargs.service. Sep 13 01:36:18.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:18.481232 ignition[913]: Stage: kargs Sep 13 01:36:18.504957 systemd[1]: Starting ignition-disks.service... Sep 13 01:36:18.481399 ignition[913]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:36:18.481421 ignition[913]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:36:18.484447 ignition[913]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:36:18.491474 ignition[913]: kargs: kargs passed Sep 13 01:36:18.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:18.537497 systemd[1]: Finished ignition-disks.service. Sep 13 01:36:18.491528 ignition[913]: Ignition finished successfully Sep 13 01:36:18.542197 systemd[1]: Reached target initrd-root-device.target. Sep 13 01:36:18.519473 ignition[919]: Ignition 2.14.0 Sep 13 01:36:18.549845 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:36:18.519480 ignition[919]: Stage: disks Sep 13 01:36:18.558742 systemd[1]: Reached target local-fs.target. Sep 13 01:36:18.519612 ignition[919]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:36:18.567543 systemd[1]: Reached target sysinit.target. Sep 13 01:36:18.519631 ignition[919]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:36:18.576651 systemd[1]: Reached target basic.target. Sep 13 01:36:18.529920 ignition[919]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:36:18.584683 systemd[1]: Starting systemd-fsck-root.service... Sep 13 01:36:18.530836 ignition[919]: disks: disks passed Sep 13 01:36:18.530892 ignition[919]: Ignition finished successfully Sep 13 01:36:18.690953 systemd-fsck[927]: ROOT: clean, 629/7326000 files, 481083/7359488 blocks Sep 13 01:36:18.697949 systemd[1]: Finished systemd-fsck-root.service. Sep 13 01:36:18.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:18.708803 systemd[1]: Mounting sysroot.mount... Sep 13 01:36:18.737360 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 01:36:18.737712 systemd[1]: Mounted sysroot.mount. Sep 13 01:36:18.741714 systemd[1]: Reached target initrd-root-fs.target. Sep 13 01:36:18.779694 systemd[1]: Mounting sysroot-usr.mount... Sep 13 01:36:18.784750 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 01:36:18.792566 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 01:36:18.792603 systemd[1]: Reached target ignition-diskful.target. Sep 13 01:36:18.799089 systemd[1]: Mounted sysroot-usr.mount. Sep 13 01:36:18.859491 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 01:36:18.864739 systemd[1]: Starting initrd-setup-root.service... Sep 13 01:36:18.893352 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (938) Sep 13 01:36:18.893960 initrd-setup-root[943]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 01:36:18.913190 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:36:18.913268 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:36:18.913279 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:36:18.928102 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 01:36:18.967123 initrd-setup-root[969]: cut: /sysroot/etc/group: No such file or directory Sep 13 01:36:19.007703 initrd-setup-root[977]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 01:36:19.035141 initrd-setup-root[985]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 01:36:19.721823 systemd[1]: Finished initrd-setup-root.service. Sep 13 01:36:19.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:19.727390 systemd[1]: Starting ignition-mount.service... Sep 13 01:36:19.760819 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 01:36:19.760843 kernel: audit: type=1130 audit(1757727379.726:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:19.760521 systemd[1]: Starting sysroot-boot.service... Sep 13 01:36:19.767803 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 01:36:19.767928 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 01:36:19.803829 systemd[1]: Finished sysroot-boot.service. Sep 13 01:36:19.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:19.829356 kernel: audit: type=1130 audit(1757727379.807:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:20.010948 ignition[1008]: INFO : Ignition 2.14.0 Sep 13 01:36:20.017357 ignition[1008]: INFO : Stage: mount Sep 13 01:36:20.017357 ignition[1008]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:36:20.017357 ignition[1008]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:36:20.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:20.059048 ignition[1008]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:36:20.059048 ignition[1008]: INFO : mount: mount passed Sep 13 01:36:20.059048 ignition[1008]: INFO : Ignition finished successfully Sep 13 01:36:20.077345 kernel: audit: type=1130 audit(1757727380.031:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:20.025528 systemd[1]: Finished ignition-mount.service. Sep 13 01:36:20.485743 coreos-metadata[937]: Sep 13 01:36:20.485 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 01:36:20.496503 coreos-metadata[937]: Sep 13 01:36:20.496 INFO Fetch successful Sep 13 01:36:20.530916 coreos-metadata[937]: Sep 13 01:36:20.530 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 01:36:20.554528 coreos-metadata[937]: Sep 13 01:36:20.554 INFO Fetch successful Sep 13 01:36:20.583168 coreos-metadata[937]: Sep 13 01:36:20.583 INFO wrote hostname ci-3510.3.8-n-1f3b7ff310 to /sysroot/etc/hostname Sep 13 01:36:20.595131 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 01:36:20.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:20.601951 systemd[1]: Starting ignition-files.service... Sep 13 01:36:20.633629 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 01:36:20.646692 kernel: audit: type=1130 audit(1757727380.600:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:20.664484 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (1016) Sep 13 01:36:20.680469 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:36:20.680500 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:36:20.680510 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:36:20.697948 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 01:36:20.714874 ignition[1035]: INFO : Ignition 2.14.0 Sep 13 01:36:20.714874 ignition[1035]: INFO : Stage: files Sep 13 01:36:20.726840 ignition[1035]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:36:20.726840 ignition[1035]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:36:20.726840 ignition[1035]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:36:20.726840 ignition[1035]: DEBUG : files: compiled without relabeling support, skipping Sep 13 01:36:20.763316 ignition[1035]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 01:36:20.763316 ignition[1035]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 01:36:20.840978 ignition[1035]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 01:36:20.848799 ignition[1035]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 01:36:20.874612 unknown[1035]: wrote ssh authorized keys file for user: core Sep 13 01:36:20.880474 ignition[1035]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 01:36:20.890258 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 01:36:20.901266 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 01:36:20.911944 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:36:20.911944 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:36:20.911944 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 01:36:20.956357 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 01:36:20.956357 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 01:36:20.956357 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem785277298" Sep 13 01:36:20.999821 ignition[1035]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem785277298": device or resource busy Sep 13 01:36:20.999821 ignition[1035]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem785277298", trying btrfs: device or resource busy Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem785277298" Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem785277298" Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem785277298" Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem785277298" Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3809435461" Sep 13 01:36:20.999821 ignition[1035]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3809435461": device or resource busy Sep 13 01:36:20.999821 ignition[1035]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3809435461", trying btrfs: device or resource busy Sep 13 01:36:20.999821 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3809435461" Sep 13 01:36:20.988692 systemd[1]: mnt-oem785277298.mount: Deactivated successfully. Sep 13 01:36:21.176423 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3809435461" Sep 13 01:36:21.176423 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3809435461" Sep 13 01:36:21.176423 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3809435461" Sep 13 01:36:21.176423 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 01:36:21.176423 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 01:36:21.176423 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 Sep 13 01:36:21.463285 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 13 01:36:21.679843 ignition[1035]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 13 01:36:21.679843 ignition[1035]: INFO : files: op(f): [started] processing unit "waagent.service" Sep 13 01:36:21.679843 ignition[1035]: INFO : files: op(f): [finished] processing unit "waagent.service" Sep 13 01:36:21.679843 ignition[1035]: INFO : files: op(10): [started] processing unit "nvidia.service" Sep 13 01:36:21.679843 ignition[1035]: INFO : files: op(10): [finished] processing unit "nvidia.service" Sep 13 01:36:21.744338 kernel: audit: type=1130 audit(1757727381.704:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.695323 systemd[1]: Finished ignition-files.service. Sep 13 01:36:21.753806 ignition[1035]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Sep 13 01:36:21.753806 ignition[1035]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Sep 13 01:36:21.753806 ignition[1035]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Sep 13 01:36:21.753806 ignition[1035]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Sep 13 01:36:21.753806 ignition[1035]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:36:21.753806 ignition[1035]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:36:21.753806 ignition[1035]: INFO : files: files passed Sep 13 01:36:21.753806 ignition[1035]: INFO : Ignition finished successfully Sep 13 01:36:21.936775 kernel: audit: type=1130 audit(1757727381.773:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.936811 kernel: audit: type=1131 audit(1757727381.773:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.936822 kernel: audit: type=1130 audit(1757727381.820:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.936832 kernel: audit: type=1130 audit(1757727381.885:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.936841 kernel: audit: type=1131 audit(1757727381.904:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.728965 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 01:36:21.942662 initrd-setup-root-after-ignition[1060]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 01:36:21.749311 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 01:36:21.750360 systemd[1]: Starting ignition-quench.service... Sep 13 01:36:21.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.768586 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 01:36:21.768689 systemd[1]: Finished ignition-quench.service. Sep 13 01:36:21.782204 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 01:36:21.820982 systemd[1]: Reached target ignition-complete.target. Sep 13 01:36:21.849542 systemd[1]: Starting initrd-parse-etc.service... Sep 13 01:36:21.873219 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 01:36:21.873349 systemd[1]: Finished initrd-parse-etc.service. Sep 13 01:36:22.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:21.905440 systemd[1]: Reached target initrd-fs.target. Sep 13 01:36:21.932797 systemd[1]: Reached target initrd.target. Sep 13 01:36:21.936976 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 01:36:21.937896 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 01:36:21.966281 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 01:36:21.976836 systemd[1]: Starting initrd-cleanup.service... Sep 13 01:36:21.998122 systemd[1]: Stopped target nss-lookup.target. Sep 13 01:36:22.003766 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 01:36:22.012699 systemd[1]: Stopped target timers.target. Sep 13 01:36:22.021131 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 01:36:22.021195 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 01:36:22.030750 systemd[1]: Stopped target initrd.target. Sep 13 01:36:22.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.039767 systemd[1]: Stopped target basic.target. Sep 13 01:36:22.048570 systemd[1]: Stopped target ignition-complete.target. Sep 13 01:36:22.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.058232 systemd[1]: Stopped target ignition-diskful.target. Sep 13 01:36:22.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.070598 systemd[1]: Stopped target initrd-root-device.target. Sep 13 01:36:22.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.080168 systemd[1]: Stopped target remote-fs.target. Sep 13 01:36:22.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.089382 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 01:36:22.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.099060 systemd[1]: Stopped target sysinit.target. Sep 13 01:36:22.107233 systemd[1]: Stopped target local-fs.target. Sep 13 01:36:22.230730 ignition[1073]: INFO : Ignition 2.14.0 Sep 13 01:36:22.230730 ignition[1073]: INFO : Stage: umount Sep 13 01:36:22.230730 ignition[1073]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:36:22.230730 ignition[1073]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:36:22.230730 ignition[1073]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:36:22.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.116659 systemd[1]: Stopped target local-fs-pre.target. Sep 13 01:36:22.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.300700 ignition[1073]: INFO : umount: umount passed Sep 13 01:36:22.300700 ignition[1073]: INFO : Ignition finished successfully Sep 13 01:36:22.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.125734 systemd[1]: Stopped target swap.target. Sep 13 01:36:22.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.136204 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 01:36:22.136281 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 01:36:22.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.145902 systemd[1]: Stopped target cryptsetup.target. Sep 13 01:36:22.155202 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 01:36:22.155268 systemd[1]: Stopped dracut-initqueue.service. Sep 13 01:36:22.164237 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 01:36:22.164288 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 01:36:22.174412 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 01:36:22.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.174460 systemd[1]: Stopped ignition-files.service. Sep 13 01:36:22.183512 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 01:36:22.183559 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 01:36:22.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.194844 systemd[1]: Stopping ignition-mount.service... Sep 13 01:36:22.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.455000 audit: BPF prog-id=6 op=UNLOAD Sep 13 01:36:22.202293 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 01:36:22.202387 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 01:36:22.208234 systemd[1]: Stopping sysroot-boot.service... Sep 13 01:36:22.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.226750 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 01:36:22.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.226862 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 01:36:22.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.240740 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 01:36:22.240808 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 01:36:22.246588 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 01:36:22.247159 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 01:36:22.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.251545 systemd[1]: Finished initrd-cleanup.service. Sep 13 01:36:22.257453 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 01:36:22.257560 systemd[1]: Stopped ignition-mount.service. Sep 13 01:36:22.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.269743 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 01:36:22.585673 kernel: hv_netvsc 002248bd-a1df-0022-48bd-a1df002248bd eth0: Data path switched from VF: enP33476s1 Sep 13 01:36:22.269796 systemd[1]: Stopped ignition-disks.service. Sep 13 01:36:22.295681 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 01:36:22.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.295736 systemd[1]: Stopped ignition-kargs.service. Sep 13 01:36:22.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.304943 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 01:36:22.304988 systemd[1]: Stopped ignition-fetch.service. Sep 13 01:36:22.317815 systemd[1]: Stopped target network.target. Sep 13 01:36:22.326295 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 01:36:22.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.326377 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 01:36:22.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.336531 systemd[1]: Stopped target paths.target. Sep 13 01:36:22.341973 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 01:36:22.351384 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 01:36:22.357983 systemd[1]: Stopped target slices.target. Sep 13 01:36:22.370510 systemd[1]: Stopped target sockets.target. Sep 13 01:36:22.380461 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 01:36:22.380497 systemd[1]: Closed iscsid.socket. Sep 13 01:36:22.392102 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 01:36:22.392132 systemd[1]: Closed iscsiuio.socket. Sep 13 01:36:22.396383 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 01:36:22.396434 systemd[1]: Stopped ignition-setup.service. Sep 13 01:36:22.408059 systemd[1]: Stopping systemd-networkd.service... Sep 13 01:36:22.418301 systemd[1]: Stopping systemd-resolved.service... Sep 13 01:36:22.426420 systemd-networkd[873]: eth0: DHCPv6 lease lost Sep 13 01:36:22.720000 audit: BPF prog-id=9 op=UNLOAD Sep 13 01:36:22.427927 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 01:36:22.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.428028 systemd[1]: Stopped systemd-networkd.service. Sep 13 01:36:22.441774 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 01:36:22.441865 systemd[1]: Stopped systemd-resolved.service. Sep 13 01:36:22.451691 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 01:36:22.451745 systemd[1]: Closed systemd-networkd.socket. Sep 13 01:36:22.463036 systemd[1]: Stopping network-cleanup.service... Sep 13 01:36:22.471881 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 01:36:22.471974 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 01:36:22.483901 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 01:36:22.483959 systemd[1]: Stopped systemd-sysctl.service. Sep 13 01:36:22.499720 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 01:36:22.499780 systemd[1]: Stopped systemd-modules-load.service. Sep 13 01:36:22.504931 systemd[1]: Stopping systemd-udevd.service... Sep 13 01:36:22.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.514472 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 01:36:22.523725 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 01:36:22.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:22.523910 systemd[1]: Stopped systemd-udevd.service. Sep 13 01:36:22.535754 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 01:36:22.535802 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 01:36:22.547120 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 01:36:22.547170 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 01:36:22.555231 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 01:36:22.555290 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 01:36:22.565034 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 01:36:22.565095 systemd[1]: Stopped dracut-cmdline.service. Sep 13 01:36:22.597115 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 01:36:22.597175 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 01:36:22.612067 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 01:36:22.897913 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Sep 13 01:36:22.897953 iscsid[880]: iscsid shutting down. Sep 13 01:36:22.629432 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 01:36:22.629514 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 01:36:22.640030 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 01:36:22.640121 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 01:36:22.720833 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 01:36:22.720956 systemd[1]: Stopped network-cleanup.service. Sep 13 01:36:22.789785 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 01:36:22.789900 systemd[1]: Stopped sysroot-boot.service. Sep 13 01:36:22.799239 systemd[1]: Reached target initrd-switch-root.target. Sep 13 01:36:22.807962 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 01:36:22.808034 systemd[1]: Stopped initrd-setup-root.service. Sep 13 01:36:22.819859 systemd[1]: Starting initrd-switch-root.service... Sep 13 01:36:22.838193 systemd[1]: Switching root. Sep 13 01:36:22.898517 systemd-journald[276]: Journal stopped Sep 13 01:36:40.437455 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 01:36:40.437479 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 01:36:40.437490 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 01:36:40.437501 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 01:36:40.437509 kernel: SELinux: policy capability open_perms=1 Sep 13 01:36:40.437517 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 01:36:40.437526 kernel: SELinux: policy capability always_check_network=0 Sep 13 01:36:40.437534 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 01:36:40.437545 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 01:36:40.437553 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 01:36:40.437561 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 01:36:40.437570 kernel: kauditd_printk_skb: 35 callbacks suppressed Sep 13 01:36:40.437579 kernel: audit: type=1403 audit(1757727385.882:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 01:36:40.437589 systemd[1]: Successfully loaded SELinux policy in 355.534ms. Sep 13 01:36:40.437600 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.223ms. Sep 13 01:36:40.437612 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:36:40.437622 systemd[1]: Detected virtualization microsoft. Sep 13 01:36:40.437631 systemd[1]: Detected architecture arm64. Sep 13 01:36:40.437640 systemd[1]: Detected first boot. Sep 13 01:36:40.437650 systemd[1]: Hostname set to . Sep 13 01:36:40.437659 systemd[1]: Initializing machine ID from random generator. Sep 13 01:36:40.437668 kernel: audit: type=1400 audit(1757727386.987:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:36:40.437679 kernel: audit: type=1400 audit(1757727386.987:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:36:40.437688 kernel: audit: type=1334 audit(1757727387.004:82): prog-id=10 op=LOAD Sep 13 01:36:40.437697 kernel: audit: type=1334 audit(1757727387.004:83): prog-id=10 op=UNLOAD Sep 13 01:36:40.437705 kernel: audit: type=1334 audit(1757727387.021:84): prog-id=11 op=LOAD Sep 13 01:36:40.437713 kernel: audit: type=1334 audit(1757727387.021:85): prog-id=11 op=UNLOAD Sep 13 01:36:40.437722 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 01:36:40.437731 kernel: audit: type=1400 audit(1757727388.519:86): avc: denied { associate } for pid=1106 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 01:36:40.437744 kernel: audit: type=1300 audit(1757727388.519:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022114 a1=4000028108 a2=4000026180 a3=32 items=0 ppid=1089 pid=1106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:40.437753 kernel: audit: type=1327 audit(1757727388.519:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:36:40.437763 systemd[1]: Populated /etc with preset unit settings. Sep 13 01:36:40.437773 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:36:40.437782 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:36:40.437793 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:36:40.437803 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 13 01:36:40.437811 kernel: audit: type=1334 audit(1757727399.581:88): prog-id=12 op=LOAD Sep 13 01:36:40.437820 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 01:36:40.437829 kernel: audit: type=1334 audit(1757727399.581:89): prog-id=3 op=UNLOAD Sep 13 01:36:40.437838 systemd[1]: Stopped iscsiuio.service. Sep 13 01:36:40.437850 kernel: audit: type=1334 audit(1757727399.581:90): prog-id=13 op=LOAD Sep 13 01:36:40.437859 kernel: audit: type=1334 audit(1757727399.581:91): prog-id=14 op=LOAD Sep 13 01:36:40.437867 kernel: audit: type=1334 audit(1757727399.581:92): prog-id=4 op=UNLOAD Sep 13 01:36:40.437892 kernel: audit: type=1334 audit(1757727399.581:93): prog-id=5 op=UNLOAD Sep 13 01:36:40.437903 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 01:36:40.437912 kernel: audit: type=1334 audit(1757727399.581:94): prog-id=15 op=LOAD Sep 13 01:36:40.437921 kernel: audit: type=1334 audit(1757727399.581:95): prog-id=12 op=UNLOAD Sep 13 01:36:40.437930 systemd[1]: Stopped iscsid.service. Sep 13 01:36:40.437939 kernel: audit: type=1334 audit(1757727399.581:96): prog-id=16 op=LOAD Sep 13 01:36:40.437947 kernel: audit: type=1334 audit(1757727399.581:97): prog-id=17 op=LOAD Sep 13 01:36:40.437957 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 01:36:40.437968 systemd[1]: Stopped initrd-switch-root.service. Sep 13 01:36:40.437978 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 01:36:40.437987 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 01:36:40.437997 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 01:36:40.438006 systemd[1]: Created slice system-getty.slice. Sep 13 01:36:40.438016 systemd[1]: Created slice system-modprobe.slice. Sep 13 01:36:40.438025 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 01:36:40.438035 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 01:36:40.438045 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 01:36:40.438056 systemd[1]: Created slice user.slice. Sep 13 01:36:40.438065 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:36:40.438074 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 01:36:40.438084 systemd[1]: Set up automount boot.automount. Sep 13 01:36:40.438093 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 01:36:40.438103 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 01:36:40.438112 systemd[1]: Stopped target initrd-fs.target. Sep 13 01:36:40.438121 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 01:36:40.438132 systemd[1]: Reached target integritysetup.target. Sep 13 01:36:40.438142 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:36:40.438151 systemd[1]: Reached target remote-fs.target. Sep 13 01:36:40.438162 systemd[1]: Reached target slices.target. Sep 13 01:36:40.438171 systemd[1]: Reached target swap.target. Sep 13 01:36:40.438180 systemd[1]: Reached target torcx.target. Sep 13 01:36:40.438191 systemd[1]: Reached target veritysetup.target. Sep 13 01:36:40.438200 systemd[1]: Listening on systemd-coredump.socket. Sep 13 01:36:40.438210 systemd[1]: Listening on systemd-initctl.socket. Sep 13 01:36:40.438220 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:36:40.438229 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:36:40.438238 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:36:40.438248 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 01:36:40.438258 systemd[1]: Mounting dev-hugepages.mount... Sep 13 01:36:40.438268 systemd[1]: Mounting dev-mqueue.mount... Sep 13 01:36:40.438278 systemd[1]: Mounting media.mount... Sep 13 01:36:40.438287 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 01:36:40.438297 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 01:36:40.438306 systemd[1]: Mounting tmp.mount... Sep 13 01:36:40.438315 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 01:36:40.438325 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:36:40.438352 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:36:40.438362 systemd[1]: Starting modprobe@configfs.service... Sep 13 01:36:40.438373 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:36:40.438384 systemd[1]: Starting modprobe@drm.service... Sep 13 01:36:40.438393 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:36:40.438403 systemd[1]: Starting modprobe@fuse.service... Sep 13 01:36:40.438412 systemd[1]: Starting modprobe@loop.service... Sep 13 01:36:40.438422 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 01:36:40.438432 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 01:36:40.438441 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 01:36:40.438452 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 01:36:40.438462 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 01:36:40.438472 systemd[1]: Stopped systemd-journald.service. Sep 13 01:36:40.438481 systemd[1]: systemd-journald.service: Consumed 3.084s CPU time. Sep 13 01:36:40.438491 systemd[1]: Starting systemd-journald.service... Sep 13 01:36:40.438501 kernel: loop: module loaded Sep 13 01:36:40.438509 kernel: fuse: init (API version 7.34) Sep 13 01:36:40.438518 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:36:40.438528 systemd[1]: Starting systemd-network-generator.service... Sep 13 01:36:40.438538 systemd[1]: Starting systemd-remount-fs.service... Sep 13 01:36:40.438548 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:36:40.438557 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 01:36:40.438566 systemd[1]: Stopped verity-setup.service. Sep 13 01:36:40.438576 systemd[1]: Mounted dev-hugepages.mount. Sep 13 01:36:40.438586 systemd[1]: Mounted dev-mqueue.mount. Sep 13 01:36:40.438596 systemd[1]: Mounted media.mount. Sep 13 01:36:40.438606 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 01:36:40.438615 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 01:36:40.438626 systemd[1]: Mounted tmp.mount. Sep 13 01:36:40.438638 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 01:36:40.438649 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:36:40.438664 systemd-journald[1212]: Journal started Sep 13 01:36:40.438708 systemd-journald[1212]: Runtime Journal (/run/log/journal/68bd1da7594144a6b89fa666dadbbdf2) is 8.0M, max 78.5M, 70.5M free. Sep 13 01:36:25.882000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 01:36:26.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:36:26.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:36:27.004000 audit: BPF prog-id=10 op=LOAD Sep 13 01:36:27.004000 audit: BPF prog-id=10 op=UNLOAD Sep 13 01:36:27.021000 audit: BPF prog-id=11 op=LOAD Sep 13 01:36:27.021000 audit: BPF prog-id=11 op=UNLOAD Sep 13 01:36:28.519000 audit[1106]: AVC avc: denied { associate } for pid=1106 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 01:36:28.519000 audit[1106]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022114 a1=4000028108 a2=4000026180 a3=32 items=0 ppid=1089 pid=1106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:28.519000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:36:28.528000 audit[1106]: AVC avc: denied { associate } for pid=1106 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 01:36:28.528000 audit[1106]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000221e9 a2=1ed a3=0 items=2 ppid=1089 pid=1106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:28.528000 audit: CWD cwd="/" Sep 13 01:36:28.528000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:28.528000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:28.528000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:36:39.581000 audit: BPF prog-id=12 op=LOAD Sep 13 01:36:39.581000 audit: BPF prog-id=3 op=UNLOAD Sep 13 01:36:39.581000 audit: BPF prog-id=13 op=LOAD Sep 13 01:36:39.581000 audit: BPF prog-id=14 op=LOAD Sep 13 01:36:39.581000 audit: BPF prog-id=4 op=UNLOAD Sep 13 01:36:39.581000 audit: BPF prog-id=5 op=UNLOAD Sep 13 01:36:39.581000 audit: BPF prog-id=15 op=LOAD Sep 13 01:36:39.581000 audit: BPF prog-id=12 op=UNLOAD Sep 13 01:36:39.581000 audit: BPF prog-id=16 op=LOAD Sep 13 01:36:39.581000 audit: BPF prog-id=17 op=LOAD Sep 13 01:36:39.582000 audit: BPF prog-id=13 op=UNLOAD Sep 13 01:36:39.582000 audit: BPF prog-id=14 op=UNLOAD Sep 13 01:36:39.582000 audit: BPF prog-id=18 op=LOAD Sep 13 01:36:39.582000 audit: BPF prog-id=15 op=UNLOAD Sep 13 01:36:39.582000 audit: BPF prog-id=19 op=LOAD Sep 13 01:36:39.582000 audit: BPF prog-id=20 op=LOAD Sep 13 01:36:39.582000 audit: BPF prog-id=16 op=UNLOAD Sep 13 01:36:39.582000 audit: BPF prog-id=17 op=UNLOAD Sep 13 01:36:39.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:39.630000 audit: BPF prog-id=18 op=UNLOAD Sep 13 01:36:39.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:39.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:39.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:39.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.260000 audit: BPF prog-id=21 op=LOAD Sep 13 01:36:40.260000 audit: BPF prog-id=22 op=LOAD Sep 13 01:36:40.260000 audit: BPF prog-id=23 op=LOAD Sep 13 01:36:40.260000 audit: BPF prog-id=19 op=UNLOAD Sep 13 01:36:40.260000 audit: BPF prog-id=20 op=UNLOAD Sep 13 01:36:40.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.435000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 01:36:40.435000 audit[1212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffe0e2ac00 a2=4000 a3=1 items=0 ppid=1 pid=1212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:40.435000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 01:36:40.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:28.426596 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:36:39.579162 systemd[1]: Queued start job for default target multi-user.target. Sep 13 01:36:28.454740 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:36:39.579177 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 01:36:28.454788 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:36:39.583383 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 01:36:28.454854 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 01:36:39.583770 systemd[1]: systemd-journald.service: Consumed 3.084s CPU time. Sep 13 01:36:28.454888 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 01:36:28.454939 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 01:36:28.454962 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 01:36:28.455224 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 01:36:28.455276 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:36:28.455289 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:36:28.504889 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 01:36:28.504944 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 01:36:28.504982 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 01:36:28.504997 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 01:36:28.505021 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 01:36:28.505046 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 01:36:35.031044 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:36:35.031371 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:36:35.031476 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:36:35.031650 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:36:35.031704 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 01:36:35.031763 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-09-13T01:36:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 01:36:40.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.459758 systemd[1]: Started systemd-journald.service. Sep 13 01:36:40.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.460790 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 01:36:40.460946 systemd[1]: Finished modprobe@configfs.service. Sep 13 01:36:40.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.466299 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:36:40.466463 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:36:40.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.471556 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:36:40.471694 systemd[1]: Finished modprobe@drm.service. Sep 13 01:36:40.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.476455 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:36:40.476598 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:36:40.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.483169 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 01:36:40.483318 systemd[1]: Finished modprobe@fuse.service. Sep 13 01:36:40.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.489231 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:36:40.489422 systemd[1]: Finished modprobe@loop.service. Sep 13 01:36:40.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.494773 systemd[1]: Finished systemd-network-generator.service. Sep 13 01:36:40.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.501248 systemd[1]: Finished systemd-remount-fs.service. Sep 13 01:36:40.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.507555 systemd[1]: Reached target network-pre.target. Sep 13 01:36:40.514560 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 01:36:40.521432 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 01:36:40.527900 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 01:36:40.589381 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 01:36:40.596931 systemd[1]: Starting systemd-journal-flush.service... Sep 13 01:36:40.601854 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:36:40.603313 systemd[1]: Starting systemd-random-seed.service... Sep 13 01:36:40.609412 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:36:40.610806 systemd[1]: Starting systemd-sysusers.service... Sep 13 01:36:40.616939 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:36:40.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.624543 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:36:40.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.630141 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 01:36:40.636005 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 01:36:40.642390 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:36:40.647948 systemd[1]: Starting systemd-udev-settle.service... Sep 13 01:36:40.659599 udevadm[1226]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 01:36:40.687535 systemd-journald[1212]: Time spent on flushing to /var/log/journal/68bd1da7594144a6b89fa666dadbbdf2 is 15.698ms for 1088 entries. Sep 13 01:36:40.687535 systemd-journald[1212]: System Journal (/var/log/journal/68bd1da7594144a6b89fa666dadbbdf2) is 8.0M, max 2.6G, 2.6G free. Sep 13 01:36:40.794866 systemd-journald[1212]: Received client request to flush runtime journal. Sep 13 01:36:40.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.703221 systemd[1]: Finished systemd-random-seed.service. Sep 13 01:36:40.708480 systemd[1]: Reached target first-boot-complete.target. Sep 13 01:36:40.796087 systemd[1]: Finished systemd-journal-flush.service. Sep 13 01:36:40.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:40.868732 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:36:40.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:41.555659 systemd[1]: Finished systemd-sysusers.service. Sep 13 01:36:41.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:42.469406 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 01:36:42.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:42.475000 audit: BPF prog-id=24 op=LOAD Sep 13 01:36:42.475000 audit: BPF prog-id=25 op=LOAD Sep 13 01:36:42.475000 audit: BPF prog-id=7 op=UNLOAD Sep 13 01:36:42.475000 audit: BPF prog-id=8 op=UNLOAD Sep 13 01:36:42.476779 systemd[1]: Starting systemd-udevd.service... Sep 13 01:36:42.496063 systemd-udevd[1229]: Using default interface naming scheme 'v252'. Sep 13 01:36:43.708447 systemd[1]: Started systemd-udevd.service. Sep 13 01:36:43.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:43.719000 audit: BPF prog-id=26 op=LOAD Sep 13 01:36:43.722321 systemd[1]: Starting systemd-networkd.service... Sep 13 01:36:43.748120 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Sep 13 01:36:43.819000 audit[1246]: AVC avc: denied { confidentiality } for pid=1246 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 01:36:43.829357 kernel: hv_vmbus: registering driver hv_balloon Sep 13 01:36:43.839442 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 01:36:43.839637 kernel: hv_balloon: Memory hot add disabled on ARM64 Sep 13 01:36:43.840000 audit: BPF prog-id=27 op=LOAD Sep 13 01:36:43.840000 audit: BPF prog-id=28 op=LOAD Sep 13 01:36:43.840000 audit: BPF prog-id=29 op=LOAD Sep 13 01:36:43.841708 systemd[1]: Starting systemd-userdbd.service... Sep 13 01:36:43.819000 audit[1246]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaed34fd30 a1=aa2c a2=ffffac6d24b0 a3=aaaaed2a9010 items=12 ppid=1229 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:43.819000 audit: CWD cwd="/" Sep 13 01:36:43.819000 audit: PATH item=0 name=(null) inode=5852 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=1 name=(null) inode=10665 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=2 name=(null) inode=10665 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=3 name=(null) inode=10666 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=4 name=(null) inode=10665 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=5 name=(null) inode=10667 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=6 name=(null) inode=10665 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=7 name=(null) inode=10668 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=8 name=(null) inode=10665 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=9 name=(null) inode=10669 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=10 name=(null) inode=10665 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PATH item=11 name=(null) inode=10670 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:43.819000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 01:36:43.863385 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 01:36:43.868435 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 01:36:43.868545 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 01:36:43.883356 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 01:36:43.883470 kernel: Console: switching to colour dummy device 80x25 Sep 13 01:36:43.892393 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 01:36:43.938546 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 01:36:43.938829 kernel: hv_vmbus: registering driver hv_utils Sep 13 01:36:43.943404 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 01:36:43.943509 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 01:36:43.950763 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 01:36:44.053675 systemd[1]: Started systemd-userdbd.service. Sep 13 01:36:44.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.391224 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:36:44.399674 systemd[1]: Finished systemd-udev-settle.service. Sep 13 01:36:44.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.406526 systemd[1]: Starting lvm2-activation-early.service... Sep 13 01:36:44.788822 lvm[1306]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:36:44.790270 systemd-networkd[1249]: lo: Link UP Sep 13 01:36:44.790282 systemd-networkd[1249]: lo: Gained carrier Sep 13 01:36:44.790758 systemd-networkd[1249]: Enumeration completed Sep 13 01:36:44.790907 systemd[1]: Started systemd-networkd.service. Sep 13 01:36:44.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.798045 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 01:36:44.800338 kernel: kauditd_printk_skb: 78 callbacks suppressed Sep 13 01:36:44.800420 kernel: audit: type=1130 audit(1757727404.795:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.834965 systemd-networkd[1249]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:36:44.854181 systemd[1]: Finished lvm2-activation-early.service. Sep 13 01:36:44.860632 systemd[1]: Reached target cryptsetup.target. Sep 13 01:36:44.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.885100 kernel: audit: type=1130 audit(1757727404.859:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.886529 systemd[1]: Starting lvm2-activation.service... Sep 13 01:36:44.891484 lvm[1308]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:36:44.896138 kernel: mlx5_core 82c4:00:02.0 enP33476s1: Link up Sep 13 01:36:44.896441 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 01:36:44.930247 kernel: hv_netvsc 002248bd-a1df-0022-48bd-a1df002248bd eth0: Data path switched to VF: enP33476s1 Sep 13 01:36:44.930810 systemd-networkd[1249]: enP33476s1: Link UP Sep 13 01:36:44.931100 systemd-networkd[1249]: eth0: Link UP Sep 13 01:36:44.931184 systemd-networkd[1249]: eth0: Gained carrier Sep 13 01:36:44.932660 systemd[1]: Finished lvm2-activation.service. Sep 13 01:36:44.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.938580 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:36:44.939303 systemd-networkd[1249]: enP33476s1: Gained carrier Sep 13 01:36:44.960797 kernel: audit: type=1130 audit(1757727404.937:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:44.961110 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 01:36:44.961148 systemd[1]: Reached target local-fs.target. Sep 13 01:36:44.967418 systemd[1]: Reached target machines.target. Sep 13 01:36:44.973243 systemd-networkd[1249]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:36:44.973643 systemd[1]: Starting ldconfig.service... Sep 13 01:36:45.010844 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.010929 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:45.012374 systemd[1]: Starting systemd-boot-update.service... Sep 13 01:36:45.018142 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 01:36:45.025169 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 01:36:45.033150 systemd[1]: Starting systemd-sysext.service... Sep 13 01:36:45.092449 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1310 (bootctl) Sep 13 01:36:45.093917 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 01:36:45.161372 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 01:36:45.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.191119 kernel: audit: type=1130 audit(1757727405.166:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.193933 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 01:36:45.210586 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 01:36:45.211431 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 01:36:45.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.238207 kernel: audit: type=1130 audit(1757727405.217:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.256535 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 01:36:45.256749 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 01:36:45.351105 kernel: loop0: detected capacity change from 0 to 203944 Sep 13 01:36:45.424111 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 01:36:45.451103 kernel: loop1: detected capacity change from 0 to 203944 Sep 13 01:36:45.461158 systemd-fsck[1317]: fsck.fat 4.2 (2021-01-31) Sep 13 01:36:45.461158 systemd-fsck[1317]: /dev/sda1: 236 files, 117310/258078 clusters Sep 13 01:36:45.463319 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 01:36:45.471197 (sd-sysext)[1322]: Using extensions 'kubernetes'. Sep 13 01:36:45.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.473205 systemd[1]: Mounting boot.mount... Sep 13 01:36:45.481498 (sd-sysext)[1322]: Merged extensions into '/usr'. Sep 13 01:36:45.498108 kernel: audit: type=1130 audit(1757727405.470:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.514227 systemd[1]: Mounted boot.mount. Sep 13 01:36:45.526230 systemd[1]: Mounting usr-share-oem.mount... Sep 13 01:36:45.530814 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.532454 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:36:45.538766 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:36:45.545400 systemd[1]: Starting modprobe@loop.service... Sep 13 01:36:45.549495 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.549647 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:45.552469 systemd[1]: Finished systemd-boot-update.service. Sep 13 01:36:45.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.557725 systemd[1]: Mounted usr-share-oem.mount. Sep 13 01:36:45.581204 kernel: audit: type=1130 audit(1757727405.556:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.582268 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:36:45.582586 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:36:45.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.588216 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:36:45.588479 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:36:45.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.629622 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:36:45.629931 systemd[1]: Finished modprobe@loop.service. Sep 13 01:36:45.630295 kernel: audit: type=1130 audit(1757727405.586:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.630357 kernel: audit: type=1131 audit(1757727405.586:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.653750 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:36:45.654005 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.654388 kernel: audit: type=1130 audit(1757727405.628:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.655870 systemd[1]: Finished systemd-sysext.service. Sep 13 01:36:45.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.662986 systemd[1]: Starting ensure-sysext.service... Sep 13 01:36:45.669149 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 01:36:45.677553 systemd[1]: Reloading. Sep 13 01:36:45.757003 /usr/lib/systemd/system-generators/torcx-generator[1352]: time="2025-09-13T01:36:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:36:45.757033 /usr/lib/systemd/system-generators/torcx-generator[1352]: time="2025-09-13T01:36:45Z" level=info msg="torcx already run" Sep 13 01:36:45.846024 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:36:45.846324 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:36:45.862346 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:36:45.925000 audit: BPF prog-id=30 op=LOAD Sep 13 01:36:45.925000 audit: BPF prog-id=31 op=LOAD Sep 13 01:36:45.925000 audit: BPF prog-id=24 op=UNLOAD Sep 13 01:36:45.925000 audit: BPF prog-id=25 op=UNLOAD Sep 13 01:36:45.926000 audit: BPF prog-id=32 op=LOAD Sep 13 01:36:45.926000 audit: BPF prog-id=26 op=UNLOAD Sep 13 01:36:45.927000 audit: BPF prog-id=33 op=LOAD Sep 13 01:36:45.927000 audit: BPF prog-id=27 op=UNLOAD Sep 13 01:36:45.927000 audit: BPF prog-id=34 op=LOAD Sep 13 01:36:45.927000 audit: BPF prog-id=35 op=LOAD Sep 13 01:36:45.927000 audit: BPF prog-id=28 op=UNLOAD Sep 13 01:36:45.927000 audit: BPF prog-id=29 op=UNLOAD Sep 13 01:36:45.928000 audit: BPF prog-id=36 op=LOAD Sep 13 01:36:45.928000 audit: BPF prog-id=21 op=UNLOAD Sep 13 01:36:45.928000 audit: BPF prog-id=37 op=LOAD Sep 13 01:36:45.928000 audit: BPF prog-id=38 op=LOAD Sep 13 01:36:45.929000 audit: BPF prog-id=22 op=UNLOAD Sep 13 01:36:45.929000 audit: BPF prog-id=23 op=UNLOAD Sep 13 01:36:45.944187 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.946130 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:36:45.951772 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:36:45.958306 systemd[1]: Starting modprobe@loop.service... Sep 13 01:36:45.962474 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.962626 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:45.963541 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:36:45.963710 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:36:45.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.968883 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:36:45.969029 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:36:45.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.976012 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:36:45.976322 systemd[1]: Finished modprobe@loop.service. Sep 13 01:36:45.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:45.981865 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:36:45.981964 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.983431 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:36:45.985026 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:36:45.991238 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:36:45.997271 systemd[1]: Starting modprobe@loop.service... Sep 13 01:36:46.001425 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:36:46.001570 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:46.002449 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:36:46.002607 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:36:46.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.008317 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:36:46.008456 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:36:46.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.013797 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:36:46.013933 systemd[1]: Finished modprobe@loop.service. Sep 13 01:36:46.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.020833 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:36:46.022492 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:36:46.028539 systemd[1]: Starting modprobe@drm.service... Sep 13 01:36:46.034538 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:36:46.041301 systemd[1]: Starting modprobe@loop.service... Sep 13 01:36:46.045873 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:36:46.046059 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:46.047186 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:36:46.047367 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:36:46.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.053317 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:36:46.053466 systemd[1]: Finished modprobe@drm.service. Sep 13 01:36:46.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.058762 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:36:46.058900 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:36:46.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.064756 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:36:46.064900 systemd[1]: Finished modprobe@loop.service. Sep 13 01:36:46.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.072659 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:36:46.072737 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:36:46.073848 systemd[1]: Finished ensure-sysext.service. Sep 13 01:36:46.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:46.081738 systemd-tmpfiles[1333]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 01:36:46.353711 systemd-tmpfiles[1333]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 01:36:46.653911 systemd-tmpfiles[1333]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 01:36:46.955268 systemd-networkd[1249]: eth0: Gained IPv6LL Sep 13 01:36:46.962225 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 01:36:46.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.254139 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 01:36:50.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.261348 systemd[1]: Starting audit-rules.service... Sep 13 01:36:50.264783 kernel: kauditd_printk_skb: 44 callbacks suppressed Sep 13 01:36:50.264847 kernel: audit: type=1130 audit(1757727410.258:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.290351 systemd[1]: Starting clean-ca-certificates.service... Sep 13 01:36:50.296850 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 01:36:50.302000 audit: BPF prog-id=39 op=LOAD Sep 13 01:36:50.310930 kernel: audit: type=1334 audit(1757727410.302:214): prog-id=39 op=LOAD Sep 13 01:36:50.309431 systemd[1]: Starting systemd-resolved.service... Sep 13 01:36:50.314000 audit: BPF prog-id=40 op=LOAD Sep 13 01:36:50.322314 systemd[1]: Starting systemd-timesyncd.service... Sep 13 01:36:50.325099 kernel: audit: type=1334 audit(1757727410.314:215): prog-id=40 op=LOAD Sep 13 01:36:50.328012 systemd[1]: Starting systemd-update-utmp.service... Sep 13 01:36:50.398316 systemd[1]: Finished clean-ca-certificates.service. Sep 13 01:36:50.397000 audit[1431]: SYSTEM_BOOT pid=1431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.425383 systemd[1]: Finished systemd-update-utmp.service. Sep 13 01:36:50.443430 kernel: audit: type=1127 audit(1757727410.397:216): pid=1431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.443738 kernel: audit: type=1130 audit(1757727410.420:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.453306 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 01:36:50.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.476146 kernel: audit: type=1130 audit(1757727410.451:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.482701 systemd[1]: Started systemd-timesyncd.service. Sep 13 01:36:50.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.487645 systemd[1]: Reached target time-set.target. Sep 13 01:36:50.510928 kernel: audit: type=1130 audit(1757727410.486:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.561956 systemd-resolved[1429]: Positive Trust Anchors: Sep 13 01:36:50.561977 systemd-resolved[1429]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:36:50.562005 systemd-resolved[1429]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:36:50.648195 systemd-resolved[1429]: Using system hostname 'ci-3510.3.8-n-1f3b7ff310'. Sep 13 01:36:50.649754 systemd[1]: Started systemd-resolved.service. Sep 13 01:36:50.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.655046 systemd[1]: Reached target network.target. Sep 13 01:36:50.678422 kernel: audit: type=1130 audit(1757727410.653:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.679381 systemd[1]: Reached target network-online.target. Sep 13 01:36:50.684636 systemd[1]: Reached target nss-lookup.target. Sep 13 01:36:50.793841 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 01:36:50.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.821130 kernel: audit: type=1130 audit(1757727410.798:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:50.921310 systemd-timesyncd[1430]: Contacted time server 172.232.15.202:123 (0.flatcar.pool.ntp.org). Sep 13 01:36:50.921404 systemd-timesyncd[1430]: Initial clock synchronization to Sat 2025-09-13 01:36:50.924426 UTC. Sep 13 01:36:51.018566 augenrules[1446]: No rules Sep 13 01:36:51.017000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 01:36:51.025029 systemd[1]: Finished audit-rules.service. Sep 13 01:36:51.017000 audit[1446]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffee2ca0a0 a2=420 a3=0 items=0 ppid=1425 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:51.017000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 01:36:51.039124 kernel: audit: type=1305 audit(1757727411.017:222): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 01:36:58.102122 ldconfig[1309]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 01:36:58.119832 systemd[1]: Finished ldconfig.service. Sep 13 01:36:58.127940 systemd[1]: Starting systemd-update-done.service... Sep 13 01:36:58.189276 systemd[1]: Finished systemd-update-done.service. Sep 13 01:36:58.194371 systemd[1]: Reached target sysinit.target. Sep 13 01:36:58.198799 systemd[1]: Started motdgen.path. Sep 13 01:36:58.202789 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 01:36:58.208997 systemd[1]: Started logrotate.timer. Sep 13 01:36:58.213028 systemd[1]: Started mdadm.timer. Sep 13 01:36:58.216936 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 01:36:58.221547 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 01:36:58.221588 systemd[1]: Reached target paths.target. Sep 13 01:36:58.225656 systemd[1]: Reached target timers.target. Sep 13 01:36:58.230554 systemd[1]: Listening on dbus.socket. Sep 13 01:36:58.238167 systemd[1]: Starting docker.socket... Sep 13 01:36:58.272265 systemd[1]: Listening on sshd.socket. Sep 13 01:36:58.277587 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:58.278241 systemd[1]: Listening on docker.socket. Sep 13 01:36:58.283886 systemd[1]: Reached target sockets.target. Sep 13 01:36:58.288608 systemd[1]: Reached target basic.target. Sep 13 01:36:58.292797 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:36:58.292831 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:36:58.294135 systemd[1]: Starting containerd.service... Sep 13 01:36:58.299339 systemd[1]: Starting dbus.service... Sep 13 01:36:58.304016 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 01:36:58.309764 systemd[1]: Starting extend-filesystems.service... Sep 13 01:36:58.314208 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 01:36:58.332636 systemd[1]: Starting kubelet.service... Sep 13 01:36:58.338169 systemd[1]: Starting motdgen.service... Sep 13 01:36:58.343858 systemd[1]: Started nvidia.service. Sep 13 01:36:58.350331 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 01:36:58.356055 systemd[1]: Starting sshd-keygen.service... Sep 13 01:36:58.363843 systemd[1]: Starting systemd-logind.service... Sep 13 01:36:58.367894 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:58.367968 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 01:36:58.368507 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 01:36:58.369358 systemd[1]: Starting update-engine.service... Sep 13 01:36:58.375906 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 01:36:58.386436 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 01:36:58.386629 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 01:36:58.406846 jq[1468]: true Sep 13 01:36:58.407229 jq[1456]: false Sep 13 01:36:58.436251 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 01:36:58.436444 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 01:36:58.456264 extend-filesystems[1457]: Found loop1 Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda1 Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda2 Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda3 Sep 13 01:36:58.460708 extend-filesystems[1457]: Found usr Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda4 Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda6 Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda7 Sep 13 01:36:58.460708 extend-filesystems[1457]: Found sda9 Sep 13 01:36:58.460708 extend-filesystems[1457]: Checking size of /dev/sda9 Sep 13 01:36:58.513428 jq[1476]: true Sep 13 01:36:58.517377 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 01:36:58.517584 systemd[1]: Finished motdgen.service. Sep 13 01:36:58.548804 systemd-logind[1465]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Sep 13 01:36:58.549104 systemd-logind[1465]: New seat seat0. Sep 13 01:36:58.618500 extend-filesystems[1457]: Old size kept for /dev/sda9 Sep 13 01:36:58.618500 extend-filesystems[1457]: Found sr0 Sep 13 01:36:58.619090 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 01:36:58.619257 systemd[1]: Finished extend-filesystems.service. Sep 13 01:36:58.657691 env[1495]: time="2025-09-13T01:36:58.655634039Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 01:36:58.703515 bash[1493]: Updated "/home/core/.ssh/authorized_keys" Sep 13 01:36:58.704725 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 01:36:58.727287 env[1495]: time="2025-09-13T01:36:58.727149290Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 01:36:58.727416 env[1495]: time="2025-09-13T01:36:58.727330194Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:58.731363 env[1495]: time="2025-09-13T01:36:58.731309073Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:36:58.731363 env[1495]: time="2025-09-13T01:36:58.731351478Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:58.731638 env[1495]: time="2025-09-13T01:36:58.731601671Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:36:58.731638 env[1495]: time="2025-09-13T01:36:58.731627114Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:58.731711 env[1495]: time="2025-09-13T01:36:58.731640516Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 01:36:58.731711 env[1495]: time="2025-09-13T01:36:58.731650397Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:58.731748 env[1495]: time="2025-09-13T01:36:58.731725967Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:58.732081 env[1495]: time="2025-09-13T01:36:58.731971639Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:58.732165 env[1495]: time="2025-09-13T01:36:58.732148862Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:36:58.732197 env[1495]: time="2025-09-13T01:36:58.732166745Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 01:36:58.732263 env[1495]: time="2025-09-13T01:36:58.732237754Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 01:36:58.732263 env[1495]: time="2025-09-13T01:36:58.732257157Z" level=info msg="metadata content store policy set" policy=shared Sep 13 01:36:58.761265 env[1495]: time="2025-09-13T01:36:58.760924297Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 01:36:58.761265 env[1495]: time="2025-09-13T01:36:58.760985625Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 01:36:58.761265 env[1495]: time="2025-09-13T01:36:58.761000667Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 01:36:58.761265 env[1495]: time="2025-09-13T01:36:58.761043032Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761265 env[1495]: time="2025-09-13T01:36:58.761061315Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761265 env[1495]: time="2025-09-13T01:36:58.761090478Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761265 env[1495]: time="2025-09-13T01:36:58.761104640Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761537 env[1495]: time="2025-09-13T01:36:58.761526775Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761561 env[1495]: time="2025-09-13T01:36:58.761547298Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761584 env[1495]: time="2025-09-13T01:36:58.761561620Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761584 env[1495]: time="2025-09-13T01:36:58.761576102Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.761630 env[1495]: time="2025-09-13T01:36:58.761590504Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 01:36:58.762204 env[1495]: time="2025-09-13T01:36:58.761793930Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 01:36:58.762204 env[1495]: time="2025-09-13T01:36:58.761896264Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 01:36:58.762204 env[1495]: time="2025-09-13T01:36:58.762155817Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 01:36:58.762345 env[1495]: time="2025-09-13T01:36:58.762182461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762345 env[1495]: time="2025-09-13T01:36:58.762231107Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 01:36:58.762345 env[1495]: time="2025-09-13T01:36:58.762286074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762345 env[1495]: time="2025-09-13T01:36:58.762301396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762345 env[1495]: time="2025-09-13T01:36:58.762314998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762345 env[1495]: time="2025-09-13T01:36:58.762326960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762345 env[1495]: time="2025-09-13T01:36:58.762339081Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762479 env[1495]: time="2025-09-13T01:36:58.762351443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762479 env[1495]: time="2025-09-13T01:36:58.762363205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762479 env[1495]: time="2025-09-13T01:36:58.762376326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762479 env[1495]: time="2025-09-13T01:36:58.762389968Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 01:36:58.762573 env[1495]: time="2025-09-13T01:36:58.762515904Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762573 env[1495]: time="2025-09-13T01:36:58.762531426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762613 env[1495]: time="2025-09-13T01:36:58.762571552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.762613 env[1495]: time="2025-09-13T01:36:58.762585353Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 01:36:58.762613 env[1495]: time="2025-09-13T01:36:58.762603636Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 01:36:58.762676 env[1495]: time="2025-09-13T01:36:58.762614837Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 01:36:58.762676 env[1495]: time="2025-09-13T01:36:58.762632240Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 01:36:58.762676 env[1495]: time="2025-09-13T01:36:58.762672285Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 01:36:58.763533 env[1495]: time="2025-09-13T01:36:58.762874551Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 01:36:58.763533 env[1495]: time="2025-09-13T01:36:58.762937359Z" level=info msg="Connect containerd service" Sep 13 01:36:58.763533 env[1495]: time="2025-09-13T01:36:58.762979045Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.763665054Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.764009539Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.764049865Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.769161091Z" level=info msg="Start subscribing containerd event" Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.769226060Z" level=info msg="Start recovering state" Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.769326793Z" level=info msg="Start event monitor" Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.769346556Z" level=info msg="Start snapshots syncer" Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.769356597Z" level=info msg="Start cni network conf syncer for default" Sep 13 01:36:58.780214 env[1495]: time="2025-09-13T01:36:58.769364358Z" level=info msg="Start streaming server" Sep 13 01:36:58.764201 systemd[1]: Started containerd.service. Sep 13 01:36:58.787914 env[1495]: time="2025-09-13T01:36:58.787809925Z" level=info msg="containerd successfully booted in 0.134566s" Sep 13 01:36:58.834539 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 01:36:59.226986 dbus-daemon[1455]: [system] SELinux support is enabled Sep 13 01:36:59.227229 systemd[1]: Started dbus.service. Sep 13 01:36:59.233103 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 01:36:59.233674 dbus-daemon[1455]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 01:36:59.233132 systemd[1]: Reached target system-config.target. Sep 13 01:36:59.238986 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 01:36:59.239011 systemd[1]: Reached target user-config.target. Sep 13 01:36:59.243917 systemd[1]: Started systemd-logind.service. Sep 13 01:36:59.325588 update_engine[1466]: I0913 01:36:59.295522 1466 main.cc:92] Flatcar Update Engine starting Sep 13 01:36:59.406580 systemd[1]: Started update-engine.service. Sep 13 01:36:59.414111 update_engine[1466]: I0913 01:36:59.413982 1466 update_check_scheduler.cc:74] Next update check in 9m24s Sep 13 01:36:59.415467 systemd[1]: Started locksmithd.service. Sep 13 01:36:59.429114 systemd[1]: Started kubelet.service. Sep 13 01:36:59.923758 kubelet[1554]: E0913 01:36:59.923712 1554 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:36:59.926147 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:36:59.926311 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:37:00.544400 sshd_keygen[1475]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 01:37:00.572350 systemd[1]: Finished sshd-keygen.service. Sep 13 01:37:00.580396 systemd[1]: Starting issuegen.service... Sep 13 01:37:00.587912 systemd[1]: Started waagent.service. Sep 13 01:37:00.592912 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 01:37:00.593157 systemd[1]: Finished issuegen.service. Sep 13 01:37:00.599263 systemd[1]: Starting systemd-user-sessions.service... Sep 13 01:37:00.665126 systemd[1]: Finished systemd-user-sessions.service. Sep 13 01:37:00.672147 systemd[1]: Started getty@tty1.service. Sep 13 01:37:00.678308 systemd[1]: Started serial-getty@ttyAMA0.service. Sep 13 01:37:00.684506 systemd[1]: Reached target getty.target. Sep 13 01:37:00.689061 systemd[1]: Reached target multi-user.target. Sep 13 01:37:00.695740 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 01:37:00.706288 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 01:37:00.706482 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 01:37:00.713250 systemd[1]: Startup finished in 774ms (kernel) + 15.570s (initrd) + 35.396s (userspace) = 51.741s. Sep 13 01:37:01.084573 locksmithd[1551]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 01:37:01.937226 login[1578]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Sep 13 01:37:01.968000 login[1577]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:37:02.165434 systemd[1]: Created slice user-500.slice. Sep 13 01:37:02.166653 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 01:37:02.169679 systemd-logind[1465]: New session 2 of user core. Sep 13 01:37:02.258156 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 01:37:02.259993 systemd[1]: Starting user@500.service... Sep 13 01:37:02.349244 (systemd)[1581]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:02.872170 systemd[1581]: Queued start job for default target default.target. Sep 13 01:37:02.873101 systemd[1581]: Reached target paths.target. Sep 13 01:37:02.873252 systemd[1581]: Reached target sockets.target. Sep 13 01:37:02.873323 systemd[1581]: Reached target timers.target. Sep 13 01:37:02.873399 systemd[1581]: Reached target basic.target. Sep 13 01:37:02.873516 systemd[1581]: Reached target default.target. Sep 13 01:37:02.873600 systemd[1]: Started user@500.service. Sep 13 01:37:02.873708 systemd[1581]: Startup finished in 517ms. Sep 13 01:37:02.874687 systemd[1]: Started session-2.scope. Sep 13 01:37:02.938852 login[1578]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:37:02.944318 systemd[1]: Started session-1.scope. Sep 13 01:37:02.944946 systemd-logind[1465]: New session 1 of user core. Sep 13 01:37:09.957691 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 01:37:09.957857 systemd[1]: Stopped kubelet.service. Sep 13 01:37:09.959388 systemd[1]: Starting kubelet.service... Sep 13 01:37:10.058955 systemd[1]: Started kubelet.service. Sep 13 01:37:10.174776 kubelet[1607]: E0913 01:37:10.174708 1607 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:37:10.178007 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:37:10.178164 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:37:12.209592 waagent[1574]: 2025-09-13T01:37:12.209438Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 01:37:12.245543 waagent[1574]: 2025-09-13T01:37:12.245421Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 01:37:12.250314 waagent[1574]: 2025-09-13T01:37:12.250223Z INFO Daemon Daemon Python: 3.9.16 Sep 13 01:37:12.255041 waagent[1574]: 2025-09-13T01:37:12.254920Z INFO Daemon Daemon Run daemon Sep 13 01:37:12.259488 waagent[1574]: 2025-09-13T01:37:12.259397Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 01:37:12.303027 waagent[1574]: 2025-09-13T01:37:12.302850Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 01:37:12.318464 waagent[1574]: 2025-09-13T01:37:12.318290Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 01:37:12.328304 waagent[1574]: 2025-09-13T01:37:12.328199Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 01:37:12.333824 waagent[1574]: 2025-09-13T01:37:12.333710Z INFO Daemon Daemon Using waagent for provisioning Sep 13 01:37:12.339983 waagent[1574]: 2025-09-13T01:37:12.339868Z INFO Daemon Daemon Activate resource disk Sep 13 01:37:12.344810 waagent[1574]: 2025-09-13T01:37:12.344715Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 01:37:12.359523 waagent[1574]: 2025-09-13T01:37:12.359402Z INFO Daemon Daemon Found device: None Sep 13 01:37:12.364334 waagent[1574]: 2025-09-13T01:37:12.364235Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 01:37:12.373531 waagent[1574]: 2025-09-13T01:37:12.373425Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 01:37:12.385667 waagent[1574]: 2025-09-13T01:37:12.385566Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 01:37:12.391751 waagent[1574]: 2025-09-13T01:37:12.391660Z INFO Daemon Daemon Running default provisioning handler Sep 13 01:37:12.406465 waagent[1574]: 2025-09-13T01:37:12.406293Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 01:37:12.422493 waagent[1574]: 2025-09-13T01:37:12.422332Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 01:37:12.432889 waagent[1574]: 2025-09-13T01:37:12.432781Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 01:37:12.438319 waagent[1574]: 2025-09-13T01:37:12.438204Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 01:37:12.594173 waagent[1574]: 2025-09-13T01:37:12.593935Z INFO Daemon Daemon Successfully mounted dvd Sep 13 01:37:12.734471 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 01:37:12.790689 waagent[1574]: 2025-09-13T01:37:12.790519Z INFO Daemon Daemon Detect protocol endpoint Sep 13 01:37:12.796058 waagent[1574]: 2025-09-13T01:37:12.795931Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 01:37:12.801902 waagent[1574]: 2025-09-13T01:37:12.801788Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 01:37:12.808864 waagent[1574]: 2025-09-13T01:37:12.808757Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 01:37:12.814432 waagent[1574]: 2025-09-13T01:37:12.814327Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 01:37:12.820170 waagent[1574]: 2025-09-13T01:37:12.820048Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 01:37:13.040572 waagent[1574]: 2025-09-13T01:37:13.040478Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 01:37:13.049175 waagent[1574]: 2025-09-13T01:37:13.049110Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 01:37:13.055338 waagent[1574]: 2025-09-13T01:37:13.055245Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 01:37:13.746612 waagent[1574]: 2025-09-13T01:37:13.746437Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 01:37:13.763611 waagent[1574]: 2025-09-13T01:37:13.763495Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 01:37:13.770123 waagent[1574]: 2025-09-13T01:37:13.769995Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 01:37:13.953404 waagent[1574]: 2025-09-13T01:37:13.953177Z INFO Daemon Daemon Found private key matching thumbprint AB81E616C564793AF6C715099764199AF4FC936A Sep 13 01:37:13.962683 waagent[1574]: 2025-09-13T01:37:13.962587Z INFO Daemon Daemon Fetch goal state completed Sep 13 01:37:14.049366 waagent[1574]: 2025-09-13T01:37:14.049229Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: d3c97448-1139-44c3-b184-33cfc456da90 New eTag: 5259490619411472543] Sep 13 01:37:14.061174 waagent[1574]: 2025-09-13T01:37:14.061049Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 01:37:14.117716 waagent[1574]: 2025-09-13T01:37:14.117640Z INFO Daemon Daemon Starting provisioning Sep 13 01:37:14.124692 waagent[1574]: 2025-09-13T01:37:14.124566Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 01:37:14.129925 waagent[1574]: 2025-09-13T01:37:14.129834Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-1f3b7ff310] Sep 13 01:37:14.216151 waagent[1574]: 2025-09-13T01:37:14.215961Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-1f3b7ff310] Sep 13 01:37:14.222823 waagent[1574]: 2025-09-13T01:37:14.222722Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 01:37:14.231407 waagent[1574]: 2025-09-13T01:37:14.231320Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 01:37:14.249848 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 01:37:14.250025 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 01:37:14.250107 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 01:37:14.250356 systemd[1]: Stopping systemd-networkd.service... Sep 13 01:37:14.258130 systemd-networkd[1249]: eth0: DHCPv6 lease lost Sep 13 01:37:14.259590 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 01:37:14.259782 systemd[1]: Stopped systemd-networkd.service. Sep 13 01:37:14.262108 systemd[1]: Starting systemd-networkd.service... Sep 13 01:37:14.292724 systemd-networkd[1632]: enP33476s1: Link UP Sep 13 01:37:14.292734 systemd-networkd[1632]: enP33476s1: Gained carrier Sep 13 01:37:14.293854 systemd-networkd[1632]: eth0: Link UP Sep 13 01:37:14.293866 systemd-networkd[1632]: eth0: Gained carrier Sep 13 01:37:14.294275 systemd-networkd[1632]: lo: Link UP Sep 13 01:37:14.294283 systemd-networkd[1632]: lo: Gained carrier Sep 13 01:37:14.294555 systemd-networkd[1632]: eth0: Gained IPv6LL Sep 13 01:37:14.294794 systemd-networkd[1632]: Enumeration completed Sep 13 01:37:14.294926 systemd[1]: Started systemd-networkd.service. Sep 13 01:37:14.296871 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 01:37:14.298385 systemd-networkd[1632]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:37:14.305459 waagent[1574]: 2025-09-13T01:37:14.300175Z INFO Daemon Daemon Create user account if not exists Sep 13 01:37:14.307589 waagent[1574]: 2025-09-13T01:37:14.307463Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 01:37:14.314688 waagent[1574]: 2025-09-13T01:37:14.314558Z INFO Daemon Daemon Configure sudoer Sep 13 01:37:14.325330 systemd-networkd[1632]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:37:14.327809 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 01:37:14.340495 waagent[1574]: 2025-09-13T01:37:14.340380Z INFO Daemon Daemon Configure sshd Sep 13 01:37:14.346091 waagent[1574]: 2025-09-13T01:37:14.345921Z INFO Daemon Daemon Deploy ssh public key. Sep 13 01:37:15.576855 waagent[1574]: 2025-09-13T01:37:15.576751Z INFO Daemon Daemon Provisioning complete Sep 13 01:37:15.595988 waagent[1574]: 2025-09-13T01:37:15.595893Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 01:37:15.602522 waagent[1574]: 2025-09-13T01:37:15.602406Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 01:37:15.612984 waagent[1574]: 2025-09-13T01:37:15.612877Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 01:37:15.940132 waagent[1638]: 2025-09-13T01:37:15.939915Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 01:37:15.941518 waagent[1638]: 2025-09-13T01:37:15.941430Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:37:15.941827 waagent[1638]: 2025-09-13T01:37:15.941777Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:37:15.956170 waagent[1638]: 2025-09-13T01:37:15.956036Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 01:37:15.956592 waagent[1638]: 2025-09-13T01:37:15.956535Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 01:37:16.030617 waagent[1638]: 2025-09-13T01:37:16.030394Z INFO ExtHandler ExtHandler Found private key matching thumbprint AB81E616C564793AF6C715099764199AF4FC936A Sep 13 01:37:16.031274 waagent[1638]: 2025-09-13T01:37:16.031202Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 01:37:16.051790 waagent[1638]: 2025-09-13T01:37:16.051709Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 4aa59011-3e06-47c4-9ad6-ea52be7bec3a New eTag: 5259490619411472543] Sep 13 01:37:16.053023 waagent[1638]: 2025-09-13T01:37:16.052901Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 01:37:16.221026 waagent[1638]: 2025-09-13T01:37:16.220862Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 01:37:16.256023 waagent[1638]: 2025-09-13T01:37:16.255921Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1638 Sep 13 01:37:16.260513 waagent[1638]: 2025-09-13T01:37:16.260402Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 01:37:16.262151 waagent[1638]: 2025-09-13T01:37:16.262030Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 01:37:16.425103 waagent[1638]: 2025-09-13T01:37:16.425013Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 01:37:16.425800 waagent[1638]: 2025-09-13T01:37:16.425724Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 01:37:16.435448 waagent[1638]: 2025-09-13T01:37:16.435379Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 01:37:16.436331 waagent[1638]: 2025-09-13T01:37:16.436244Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 01:37:16.437849 waagent[1638]: 2025-09-13T01:37:16.437769Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 01:37:16.439712 waagent[1638]: 2025-09-13T01:37:16.439621Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 01:37:16.440002 waagent[1638]: 2025-09-13T01:37:16.439915Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:37:16.440723 waagent[1638]: 2025-09-13T01:37:16.440640Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:37:16.441513 waagent[1638]: 2025-09-13T01:37:16.441423Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 01:37:16.442431 waagent[1638]: 2025-09-13T01:37:16.442338Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:37:16.442648 waagent[1638]: 2025-09-13T01:37:16.442580Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 01:37:16.443202 waagent[1638]: 2025-09-13T01:37:16.443112Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 01:37:16.443202 waagent[1638]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 01:37:16.443202 waagent[1638]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 01:37:16.443202 waagent[1638]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 01:37:16.443202 waagent[1638]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:37:16.443202 waagent[1638]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:37:16.443202 waagent[1638]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:37:16.444197 waagent[1638]: 2025-09-13T01:37:16.444086Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:37:16.446057 waagent[1638]: 2025-09-13T01:37:16.444740Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 01:37:16.447948 waagent[1638]: 2025-09-13T01:37:16.447854Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 01:37:16.448135 waagent[1638]: 2025-09-13T01:37:16.447542Z INFO EnvHandler ExtHandler Configure routes Sep 13 01:37:16.449254 waagent[1638]: 2025-09-13T01:37:16.449141Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 01:37:16.449515 waagent[1638]: 2025-09-13T01:37:16.449449Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 01:37:16.449723 waagent[1638]: 2025-09-13T01:37:16.449634Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 01:37:16.453281 waagent[1638]: 2025-09-13T01:37:16.453166Z INFO EnvHandler ExtHandler Gateway:None Sep 13 01:37:16.453888 waagent[1638]: 2025-09-13T01:37:16.453809Z INFO EnvHandler ExtHandler Routes:None Sep 13 01:37:16.464615 waagent[1638]: 2025-09-13T01:37:16.464521Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 01:37:16.467375 waagent[1638]: 2025-09-13T01:37:16.467288Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 01:37:16.469597 waagent[1638]: 2025-09-13T01:37:16.469518Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 01:37:16.512029 waagent[1638]: 2025-09-13T01:37:16.511813Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1632' Sep 13 01:37:16.539387 waagent[1638]: 2025-09-13T01:37:16.539308Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 01:37:16.620392 waagent[1638]: 2025-09-13T01:37:16.620227Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 01:37:16.620392 waagent[1638]: Executing ['ip', '-a', '-o', 'link']: Sep 13 01:37:16.620392 waagent[1638]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 01:37:16.620392 waagent[1638]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bd:a1:df brd ff:ff:ff:ff:ff:ff Sep 13 01:37:16.620392 waagent[1638]: 3: enP33476s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bd:a1:df brd ff:ff:ff:ff:ff:ff\ altname enP33476p0s2 Sep 13 01:37:16.620392 waagent[1638]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 01:37:16.620392 waagent[1638]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 01:37:16.620392 waagent[1638]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 01:37:16.620392 waagent[1638]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 01:37:16.620392 waagent[1638]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 01:37:16.620392 waagent[1638]: 2: eth0 inet6 fe80::222:48ff:febd:a1df/64 scope link \ valid_lft forever preferred_lft forever Sep 13 01:37:16.918038 waagent[1638]: 2025-09-13T01:37:16.917897Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 01:37:17.617532 waagent[1574]: 2025-09-13T01:37:17.617369Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 01:37:17.623550 waagent[1574]: 2025-09-13T01:37:17.623475Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 01:37:19.073443 waagent[1667]: 2025-09-13T01:37:19.073331Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 01:37:19.074643 waagent[1667]: 2025-09-13T01:37:19.074564Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 01:37:19.074935 waagent[1667]: 2025-09-13T01:37:19.074884Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 01:37:19.075215 waagent[1667]: 2025-09-13T01:37:19.075162Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Sep 13 01:37:19.091555 waagent[1667]: 2025-09-13T01:37:19.091413Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 01:37:19.092293 waagent[1667]: 2025-09-13T01:37:19.092224Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:37:19.092663 waagent[1667]: 2025-09-13T01:37:19.092608Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:37:19.093041 waagent[1667]: 2025-09-13T01:37:19.092983Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 01:37:19.108143 waagent[1667]: 2025-09-13T01:37:19.108017Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 01:37:19.122546 waagent[1667]: 2025-09-13T01:37:19.122471Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.175 Sep 13 01:37:19.123958 waagent[1667]: 2025-09-13T01:37:19.123887Z INFO ExtHandler Sep 13 01:37:19.124344 waagent[1667]: 2025-09-13T01:37:19.124288Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 3c9a64eb-90be-4b84-83be-3188654f8f0d eTag: 5259490619411472543 source: Fabric] Sep 13 01:37:19.125341 waagent[1667]: 2025-09-13T01:37:19.125279Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 01:37:19.126833 waagent[1667]: 2025-09-13T01:37:19.126764Z INFO ExtHandler Sep 13 01:37:19.127137 waagent[1667]: 2025-09-13T01:37:19.127053Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 01:37:19.134894 waagent[1667]: 2025-09-13T01:37:19.134826Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 01:37:19.135789 waagent[1667]: 2025-09-13T01:37:19.135737Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 01:37:19.157626 waagent[1667]: 2025-09-13T01:37:19.157554Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 01:37:19.231118 waagent[1667]: 2025-09-13T01:37:19.230932Z INFO ExtHandler Downloaded certificate {'thumbprint': 'AB81E616C564793AF6C715099764199AF4FC936A', 'hasPrivateKey': True} Sep 13 01:37:19.232874 waagent[1667]: 2025-09-13T01:37:19.232793Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 01:37:19.234060 waagent[1667]: 2025-09-13T01:37:19.233992Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 01:37:19.254953 waagent[1667]: 2025-09-13T01:37:19.254807Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 01:37:19.265365 waagent[1667]: 2025-09-13T01:37:19.265229Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 01:37:19.270101 waagent[1667]: 2025-09-13T01:37:19.269944Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 01:37:19.270560 waagent[1667]: 2025-09-13T01:37:19.270500Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 01:37:19.508204 waagent[1667]: 2025-09-13T01:37:19.508031Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Sep 13 01:37:19.508204 waagent[1667]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:37:19.508204 waagent[1667]: pkts bytes target prot opt in out source destination Sep 13 01:37:19.508204 waagent[1667]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:37:19.508204 waagent[1667]: pkts bytes target prot opt in out source destination Sep 13 01:37:19.508204 waagent[1667]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:37:19.508204 waagent[1667]: pkts bytes target prot opt in out source destination Sep 13 01:37:19.508204 waagent[1667]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 01:37:19.508204 waagent[1667]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 01:37:19.508204 waagent[1667]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 01:37:19.511676 waagent[1667]: 2025-09-13T01:37:19.511596Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 01:37:19.515527 waagent[1667]: 2025-09-13T01:37:19.515382Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 01:37:19.516030 waagent[1667]: 2025-09-13T01:37:19.515974Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 01:37:19.516648 waagent[1667]: 2025-09-13T01:37:19.516582Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 01:37:19.526627 waagent[1667]: 2025-09-13T01:37:19.526559Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 01:37:19.527490 waagent[1667]: 2025-09-13T01:37:19.527417Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 01:37:19.536841 waagent[1667]: 2025-09-13T01:37:19.536739Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1667 Sep 13 01:37:19.540760 waagent[1667]: 2025-09-13T01:37:19.540659Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 01:37:19.541955 waagent[1667]: 2025-09-13T01:37:19.541878Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 01:37:19.543201 waagent[1667]: 2025-09-13T01:37:19.543134Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 01:37:19.546364 waagent[1667]: 2025-09-13T01:37:19.546274Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 01:37:19.546913 waagent[1667]: 2025-09-13T01:37:19.546853Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 01:37:19.548607 waagent[1667]: 2025-09-13T01:37:19.548532Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 01:37:19.548912 waagent[1667]: 2025-09-13T01:37:19.548838Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:37:19.549233 waagent[1667]: 2025-09-13T01:37:19.549174Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:37:19.550347 waagent[1667]: 2025-09-13T01:37:19.550276Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 01:37:19.550769 waagent[1667]: 2025-09-13T01:37:19.550701Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 01:37:19.550769 waagent[1667]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 01:37:19.550769 waagent[1667]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 01:37:19.550769 waagent[1667]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 01:37:19.550769 waagent[1667]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:37:19.550769 waagent[1667]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:37:19.550769 waagent[1667]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:37:19.553558 waagent[1667]: 2025-09-13T01:37:19.553419Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 01:37:19.554413 waagent[1667]: 2025-09-13T01:37:19.554332Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:37:19.555059 waagent[1667]: 2025-09-13T01:37:19.554990Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:37:19.556128 waagent[1667]: 2025-09-13T01:37:19.555518Z INFO EnvHandler ExtHandler Configure routes Sep 13 01:37:19.558201 waagent[1667]: 2025-09-13T01:37:19.557973Z INFO EnvHandler ExtHandler Gateway:None Sep 13 01:37:19.558536 waagent[1667]: 2025-09-13T01:37:19.558449Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 01:37:19.559060 waagent[1667]: 2025-09-13T01:37:19.558967Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 01:37:19.559853 waagent[1667]: 2025-09-13T01:37:19.559772Z INFO EnvHandler ExtHandler Routes:None Sep 13 01:37:19.561197 waagent[1667]: 2025-09-13T01:37:19.561047Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 01:37:19.561859 waagent[1667]: 2025-09-13T01:37:19.561780Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 01:37:19.565518 waagent[1667]: 2025-09-13T01:37:19.565442Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 01:37:19.573240 waagent[1667]: 2025-09-13T01:37:19.573138Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 01:37:19.573240 waagent[1667]: Executing ['ip', '-a', '-o', 'link']: Sep 13 01:37:19.573240 waagent[1667]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 01:37:19.573240 waagent[1667]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bd:a1:df brd ff:ff:ff:ff:ff:ff Sep 13 01:37:19.573240 waagent[1667]: 3: enP33476s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bd:a1:df brd ff:ff:ff:ff:ff:ff\ altname enP33476p0s2 Sep 13 01:37:19.573240 waagent[1667]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 01:37:19.573240 waagent[1667]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 01:37:19.573240 waagent[1667]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 01:37:19.573240 waagent[1667]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 01:37:19.573240 waagent[1667]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 01:37:19.573240 waagent[1667]: 2: eth0 inet6 fe80::222:48ff:febd:a1df/64 scope link \ valid_lft forever preferred_lft forever Sep 13 01:37:19.586504 waagent[1667]: 2025-09-13T01:37:19.586403Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 01:37:19.606119 waagent[1667]: 2025-09-13T01:37:19.605997Z INFO ExtHandler ExtHandler Sep 13 01:37:19.607371 waagent[1667]: 2025-09-13T01:37:19.607295Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 9e242e38-e7c9-4509-9851-d82426810c49 correlation e43aeb53-b7ef-4999-8764-a9f338984f7f created: 2025-09-13T01:35:19.072693Z] Sep 13 01:37:19.611843 waagent[1667]: 2025-09-13T01:37:19.611745Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 01:37:19.617440 waagent[1667]: 2025-09-13T01:37:19.617348Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 11 ms] Sep 13 01:37:19.629889 waagent[1667]: 2025-09-13T01:37:19.629754Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 01:37:19.652592 waagent[1667]: 2025-09-13T01:37:19.652494Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 01:37:19.659557 waagent[1667]: 2025-09-13T01:37:19.659459Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 01:37:19.659839 waagent[1667]: 2025-09-13T01:37:19.659762Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: E7493E52-D0BF-46A4-BD0C-320EA6919260;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 01:37:20.207729 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 01:37:20.207922 systemd[1]: Stopped kubelet.service. Sep 13 01:37:20.209532 systemd[1]: Starting kubelet.service... Sep 13 01:37:20.317405 systemd[1]: Started kubelet.service. Sep 13 01:37:20.405285 kubelet[1712]: E0913 01:37:20.405237 1712 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:37:20.407748 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:37:20.407885 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:37:30.458294 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 01:37:30.458633 systemd[1]: Stopped kubelet.service. Sep 13 01:37:30.460439 systemd[1]: Starting kubelet.service... Sep 13 01:37:30.782359 systemd[1]: Started kubelet.service. Sep 13 01:37:30.827262 kubelet[1721]: E0913 01:37:30.827216 1721 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:37:30.829321 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:37:30.829513 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:37:32.060572 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Sep 13 01:37:35.896865 systemd[1]: Created slice system-sshd.slice. Sep 13 01:37:35.898809 systemd[1]: Started sshd@0-10.200.20.39:22-10.200.16.10:46444.service. Sep 13 01:37:36.570396 sshd[1728]: Accepted publickey for core from 10.200.16.10 port 46444 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:36.594022 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:36.598135 systemd-logind[1465]: New session 3 of user core. Sep 13 01:37:36.598753 systemd[1]: Started session-3.scope. Sep 13 01:37:36.941663 systemd[1]: Started sshd@1-10.200.20.39:22-10.200.16.10:46446.service. Sep 13 01:37:37.355859 sshd[1733]: Accepted publickey for core from 10.200.16.10 port 46446 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:37.357741 sshd[1733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:37.361974 systemd-logind[1465]: New session 4 of user core. Sep 13 01:37:37.362534 systemd[1]: Started session-4.scope. Sep 13 01:37:37.663784 sshd[1733]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:37.667126 systemd-logind[1465]: Session 4 logged out. Waiting for processes to exit. Sep 13 01:37:37.667221 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 01:37:37.667787 systemd[1]: sshd@1-10.200.20.39:22-10.200.16.10:46446.service: Deactivated successfully. Sep 13 01:37:37.668863 systemd-logind[1465]: Removed session 4. Sep 13 01:37:37.733622 systemd[1]: Started sshd@2-10.200.20.39:22-10.200.16.10:46462.service. Sep 13 01:37:38.153813 sshd[1739]: Accepted publickey for core from 10.200.16.10 port 46462 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:38.155375 sshd[1739]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:38.160489 systemd[1]: Started session-5.scope. Sep 13 01:37:38.160844 systemd-logind[1465]: New session 5 of user core. Sep 13 01:37:38.467737 sshd[1739]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:38.470490 systemd[1]: sshd@2-10.200.20.39:22-10.200.16.10:46462.service: Deactivated successfully. Sep 13 01:37:38.471231 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 01:37:38.471843 systemd-logind[1465]: Session 5 logged out. Waiting for processes to exit. Sep 13 01:37:38.472651 systemd-logind[1465]: Removed session 5. Sep 13 01:37:38.540584 systemd[1]: Started sshd@3-10.200.20.39:22-10.200.16.10:46474.service. Sep 13 01:37:38.955203 sshd[1745]: Accepted publickey for core from 10.200.16.10 port 46474 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:38.957034 sshd[1745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:38.961925 systemd[1]: Started session-6.scope. Sep 13 01:37:38.963041 systemd-logind[1465]: New session 6 of user core. Sep 13 01:37:39.264814 sshd[1745]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:39.268053 systemd[1]: sshd@3-10.200.20.39:22-10.200.16.10:46474.service: Deactivated successfully. Sep 13 01:37:39.269384 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 01:37:39.270298 systemd-logind[1465]: Session 6 logged out. Waiting for processes to exit. Sep 13 01:37:39.271802 systemd-logind[1465]: Removed session 6. Sep 13 01:37:39.335016 systemd[1]: Started sshd@4-10.200.20.39:22-10.200.16.10:46476.service. Sep 13 01:37:39.746788 sshd[1751]: Accepted publickey for core from 10.200.16.10 port 46476 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:39.748693 sshd[1751]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:39.753665 systemd[1]: Started session-7.scope. Sep 13 01:37:39.753965 systemd-logind[1465]: New session 7 of user core. Sep 13 01:37:40.429761 sudo[1754]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 01:37:40.429991 sudo[1754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:40.504322 dbus-daemon[1455]: avc: received setenforce notice (enforcing=1) Sep 13 01:37:40.506308 sudo[1754]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:40.590742 sshd[1751]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:40.594276 systemd-logind[1465]: Session 7 logged out. Waiting for processes to exit. Sep 13 01:37:40.594429 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 01:37:40.595034 systemd[1]: sshd@4-10.200.20.39:22-10.200.16.10:46476.service: Deactivated successfully. Sep 13 01:37:40.596217 systemd-logind[1465]: Removed session 7. Sep 13 01:37:40.659566 systemd[1]: Started sshd@5-10.200.20.39:22-10.200.16.10:54988.service. Sep 13 01:37:40.957756 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 13 01:37:40.957939 systemd[1]: Stopped kubelet.service. Sep 13 01:37:40.959651 systemd[1]: Starting kubelet.service... Sep 13 01:37:41.074297 sshd[1758]: Accepted publickey for core from 10.200.16.10 port 54988 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:41.076280 sshd[1758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:41.081176 systemd[1]: Started session-8.scope. Sep 13 01:37:41.082159 systemd-logind[1465]: New session 8 of user core. Sep 13 01:37:41.154400 systemd[1]: Started kubelet.service. Sep 13 01:37:41.197782 kubelet[1765]: E0913 01:37:41.197719 1765 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:37:41.199560 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:37:41.199686 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:37:41.312397 sudo[1772]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 01:37:41.313174 sudo[1772]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:41.316103 sudo[1772]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:41.321408 sudo[1771]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 01:37:41.321629 sudo[1771]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:41.331621 systemd[1]: Stopping audit-rules.service... Sep 13 01:37:41.332000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:37:41.337899 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 01:37:41.337958 kernel: audit: type=1305 audit(1757727461.332:223): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:37:41.332000 audit[1775]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd30623c0 a2=420 a3=0 items=0 ppid=1 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:41.379085 kernel: audit: type=1300 audit(1757727461.332:223): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd30623c0 a2=420 a3=0 items=0 ppid=1 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:41.379219 auditctl[1775]: No rules Sep 13 01:37:41.379653 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 01:37:41.332000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:37:41.388734 kernel: audit: type=1327 audit(1757727461.332:223): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:37:41.379841 systemd[1]: Stopped audit-rules.service. Sep 13 01:37:41.381705 systemd[1]: Starting audit-rules.service... Sep 13 01:37:41.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.407808 kernel: audit: type=1131 audit(1757727461.378:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.417194 augenrules[1792]: No rules Sep 13 01:37:41.418255 systemd[1]: Finished audit-rules.service. Sep 13 01:37:41.419288 sudo[1771]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:41.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.418000 audit[1771]: USER_END pid=1771 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.460511 kernel: audit: type=1130 audit(1757727461.417:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.460640 kernel: audit: type=1106 audit(1757727461.418:226): pid=1771 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.460682 kernel: audit: type=1104 audit(1757727461.418:227): pid=1771 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.418000 audit[1771]: CRED_DISP pid=1771 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.510285 sshd[1758]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:41.510000 audit[1758]: USER_END pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:41.538426 systemd[1]: sshd@5-10.200.20.39:22-10.200.16.10:54988.service: Deactivated successfully. Sep 13 01:37:41.510000 audit[1758]: CRED_DISP pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:41.560119 kernel: audit: type=1106 audit(1757727461.510:228): pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:41.560244 kernel: audit: type=1104 audit(1757727461.510:229): pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:41.539232 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 01:37:41.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.16.10:54988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.560984 systemd-logind[1465]: Session 8 logged out. Waiting for processes to exit. Sep 13 01:37:41.583481 kernel: audit: type=1131 audit(1757727461.537:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.16.10:54988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.587200 systemd-logind[1465]: Removed session 8. Sep 13 01:37:41.588485 systemd[1]: Started sshd@6-10.200.20.39:22-10.200.16.10:55004.service. Sep 13 01:37:41.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.16.10:55004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:41.997000 audit[1798]: USER_ACCT pid=1798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:41.998694 sshd[1798]: Accepted publickey for core from 10.200.16.10 port 55004 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:41.999000 audit[1798]: CRED_ACQ pid=1798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:41.999000 audit[1798]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6833830 a2=3 a3=1 items=0 ppid=1 pid=1798 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:41.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:37:42.000481 sshd[1798]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:42.005158 systemd[1]: Started session-9.scope. Sep 13 01:37:42.006343 systemd-logind[1465]: New session 9 of user core. Sep 13 01:37:42.009000 audit[1798]: USER_START pid=1798 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:42.011000 audit[1800]: CRED_ACQ pid=1800 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:42.235000 audit[1801]: USER_ACCT pid=1801 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:42.236517 sudo[1801]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 01:37:42.235000 audit[1801]: CRED_REFR pid=1801 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:42.236759 sudo[1801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:42.237000 audit[1801]: USER_START pid=1801 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:42.270525 systemd[1]: Starting coreos-metadata.service... Sep 13 01:37:42.365051 coreos-metadata[1805]: Sep 13 01:37:42.364 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 01:37:42.368674 coreos-metadata[1805]: Sep 13 01:37:42.368 INFO Fetch successful Sep 13 01:37:42.368845 coreos-metadata[1805]: Sep 13 01:37:42.368 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 13 01:37:42.370999 coreos-metadata[1805]: Sep 13 01:37:42.370 INFO Fetch successful Sep 13 01:37:42.371321 coreos-metadata[1805]: Sep 13 01:37:42.371 INFO Fetching http://168.63.129.16/machine/c58b76eb-4d54-467c-b1ca-a6625035ca01/c712d20f%2D1d74%2D4ba1%2D91ce%2Db54ce95d02ab.%5Fci%2D3510.3.8%2Dn%2D1f3b7ff310?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 13 01:37:42.373808 coreos-metadata[1805]: Sep 13 01:37:42.373 INFO Fetch successful Sep 13 01:37:42.409029 coreos-metadata[1805]: Sep 13 01:37:42.408 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 13 01:37:42.420160 coreos-metadata[1805]: Sep 13 01:37:42.420 INFO Fetch successful Sep 13 01:37:42.429810 systemd[1]: Finished coreos-metadata.service. Sep 13 01:37:42.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:42.946739 systemd[1]: Stopped kubelet.service. Sep 13 01:37:42.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:42.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:42.949053 systemd[1]: Starting kubelet.service... Sep 13 01:37:42.990260 systemd[1]: Reloading. Sep 13 01:37:43.085696 /usr/lib/systemd/system-generators/torcx-generator[1857]: time="2025-09-13T01:37:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:37:43.086041 /usr/lib/systemd/system-generators/torcx-generator[1857]: time="2025-09-13T01:37:43Z" level=info msg="torcx already run" Sep 13 01:37:43.178256 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:37:43.178274 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:37:43.194185 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit: BPF prog-id=47 op=LOAD Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.268000 audit: BPF prog-id=48 op=LOAD Sep 13 01:37:43.268000 audit: BPF prog-id=30 op=UNLOAD Sep 13 01:37:43.268000 audit: BPF prog-id=31 op=UNLOAD Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit: BPF prog-id=49 op=LOAD Sep 13 01:37:43.269000 audit: BPF prog-id=46 op=UNLOAD Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit: BPF prog-id=50 op=LOAD Sep 13 01:37:43.269000 audit: BPF prog-id=33 op=UNLOAD Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit: BPF prog-id=51 op=LOAD Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.269000 audit: BPF prog-id=52 op=LOAD Sep 13 01:37:43.269000 audit: BPF prog-id=34 op=UNLOAD Sep 13 01:37:43.269000 audit: BPF prog-id=35 op=UNLOAD Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.270000 audit: BPF prog-id=53 op=LOAD Sep 13 01:37:43.270000 audit: BPF prog-id=40 op=UNLOAD Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit: BPF prog-id=54 op=LOAD Sep 13 01:37:43.271000 audit: BPF prog-id=36 op=UNLOAD Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit: BPF prog-id=55 op=LOAD Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.271000 audit: BPF prog-id=56 op=LOAD Sep 13 01:37:43.271000 audit: BPF prog-id=37 op=UNLOAD Sep 13 01:37:43.271000 audit: BPF prog-id=38 op=UNLOAD Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit: BPF prog-id=57 op=LOAD Sep 13 01:37:43.272000 audit: BPF prog-id=44 op=UNLOAD Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.272000 audit: BPF prog-id=58 op=LOAD Sep 13 01:37:43.272000 audit: BPF prog-id=39 op=UNLOAD Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit: BPF prog-id=59 op=LOAD Sep 13 01:37:43.276000 audit: BPF prog-id=41 op=UNLOAD Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit: BPF prog-id=60 op=LOAD Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.277000 audit: BPF prog-id=61 op=LOAD Sep 13 01:37:43.277000 audit: BPF prog-id=42 op=UNLOAD Sep 13 01:37:43.277000 audit: BPF prog-id=43 op=UNLOAD Sep 13 01:37:43.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:43.304001 systemd[1]: Started kubelet.service. Sep 13 01:37:43.307660 systemd[1]: Stopping kubelet.service... Sep 13 01:37:43.308457 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 01:37:43.308749 systemd[1]: Stopped kubelet.service. Sep 13 01:37:43.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:43.310796 systemd[1]: Starting kubelet.service... Sep 13 01:37:43.460577 systemd[1]: Started kubelet.service. Sep 13 01:37:43.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:43.594558 kubelet[1924]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:37:43.594899 kubelet[1924]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 13 01:37:43.594947 kubelet[1924]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:37:43.595184 kubelet[1924]: I0913 01:37:43.595147 1924 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 01:37:44.457145 kubelet[1924]: I0913 01:37:44.457103 1924 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 13 01:37:44.457145 kubelet[1924]: I0913 01:37:44.457135 1924 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 01:37:44.457402 kubelet[1924]: I0913 01:37:44.457381 1924 server.go:934] "Client rotation is on, will bootstrap in background" Sep 13 01:37:44.482097 kubelet[1924]: I0913 01:37:44.482052 1924 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 01:37:44.488505 kubelet[1924]: E0913 01:37:44.488427 1924 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 01:37:44.488711 kubelet[1924]: I0913 01:37:44.488698 1924 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 01:37:44.492939 kubelet[1924]: I0913 01:37:44.492906 1924 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 01:37:44.493215 kubelet[1924]: I0913 01:37:44.493201 1924 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 13 01:37:44.493432 kubelet[1924]: I0913 01:37:44.493404 1924 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 01:37:44.493666 kubelet[1924]: I0913 01:37:44.493486 1924 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.39","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 01:37:44.493812 kubelet[1924]: I0913 01:37:44.493799 1924 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 01:37:44.493874 kubelet[1924]: I0913 01:37:44.493865 1924 container_manager_linux.go:300] "Creating device plugin manager" Sep 13 01:37:44.494050 kubelet[1924]: I0913 01:37:44.494038 1924 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:37:44.504345 kubelet[1924]: I0913 01:37:44.504311 1924 kubelet.go:408] "Attempting to sync node with API server" Sep 13 01:37:44.504532 kubelet[1924]: I0913 01:37:44.504519 1924 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 01:37:44.504659 kubelet[1924]: I0913 01:37:44.504648 1924 kubelet.go:314] "Adding apiserver pod source" Sep 13 01:37:44.504814 kubelet[1924]: I0913 01:37:44.504791 1924 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 01:37:44.510855 kubelet[1924]: E0913 01:37:44.504744 1924 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:44.511519 kubelet[1924]: E0913 01:37:44.511474 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:44.512007 kubelet[1924]: I0913 01:37:44.511976 1924 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 01:37:44.512569 kubelet[1924]: I0913 01:37:44.512540 1924 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 01:37:44.512651 kubelet[1924]: W0913 01:37:44.512604 1924 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 01:37:44.513277 kubelet[1924]: I0913 01:37:44.513252 1924 server.go:1274] "Started kubelet" Sep 13 01:37:44.519425 kubelet[1924]: W0913 01:37:44.519391 1924 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 13 01:37:44.519606 kubelet[1924]: E0913 01:37:44.519590 1924 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 01:37:44.519857 kubelet[1924]: W0913 01:37:44.519838 1924 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.20.39" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 13 01:37:44.519946 kubelet[1924]: E0913 01:37:44.519933 1924 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.200.20.39\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 01:37:44.520000 audit[1924]: AVC avc: denied { mac_admin } for pid=1924 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:44.520000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:37:44.520000 audit[1924]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000aa8de0 a1=40009b3410 a2=4000aa8db0 a3=25 items=0 ppid=1 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.520000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:37:44.520000 audit[1924]: AVC avc: denied { mac_admin } for pid=1924 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:44.520000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:37:44.520000 audit[1924]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400092da00 a1=40009b3428 a2=4000aa8e70 a3=25 items=0 ppid=1 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.520000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:37:44.521753 kubelet[1924]: I0913 01:37:44.521364 1924 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 01:37:44.521753 kubelet[1924]: I0913 01:37:44.521405 1924 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 13 01:37:44.521753 kubelet[1924]: I0913 01:37:44.521474 1924 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 01:37:44.523000 audit[1940]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.523000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff5ec08e0 a2=0 a3=1 items=0 ppid=1924 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:37:44.524000 audit[1941]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.524000 audit[1941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffefd371f0 a2=0 a3=1 items=0 ppid=1924 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:37:44.526488 kubelet[1924]: I0913 01:37:44.526439 1924 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 01:37:44.527222 kubelet[1924]: E0913 01:37:44.527200 1924 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 01:37:44.527749 kubelet[1924]: I0913 01:37:44.527698 1924 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 01:37:44.528005 kubelet[1924]: I0913 01:37:44.527967 1924 server.go:449] "Adding debug handlers to kubelet server" Sep 13 01:37:44.528324 kubelet[1924]: I0913 01:37:44.528302 1924 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 01:37:44.530027 kubelet[1924]: I0913 01:37:44.529984 1924 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 13 01:37:44.530354 kubelet[1924]: E0913 01:37:44.530320 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:44.530635 kubelet[1924]: I0913 01:37:44.530608 1924 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 01:37:44.530000 audit[1943]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.530000 audit[1943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd573c930 a2=0 a3=1 items=0 ppid=1924 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:44.534410 kubelet[1924]: I0913 01:37:44.534372 1924 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 13 01:37:44.534517 kubelet[1924]: I0913 01:37:44.534463 1924 reconciler.go:26] "Reconciler: start to sync state" Sep 13 01:37:44.534000 audit[1945]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.534000 audit[1945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff3c8fb20 a2=0 a3=1 items=0 ppid=1924 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:44.537426 kubelet[1924]: I0913 01:37:44.537399 1924 factory.go:221] Registration of the systemd container factory successfully Sep 13 01:37:44.537707 kubelet[1924]: I0913 01:37:44.537676 1924 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 01:37:44.542518 kubelet[1924]: E0913 01:37:44.542472 1924 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.39\" not found" node="10.200.20.39" Sep 13 01:37:44.546553 kubelet[1924]: I0913 01:37:44.546511 1924 factory.go:221] Registration of the containerd container factory successfully Sep 13 01:37:44.561253 kubelet[1924]: I0913 01:37:44.561209 1924 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 13 01:37:44.561432 kubelet[1924]: I0913 01:37:44.561417 1924 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 13 01:37:44.561513 kubelet[1924]: I0913 01:37:44.561503 1924 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:37:44.568481 kubelet[1924]: I0913 01:37:44.568449 1924 policy_none.go:49] "None policy: Start" Sep 13 01:37:44.569597 kubelet[1924]: I0913 01:37:44.569562 1924 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 13 01:37:44.569597 kubelet[1924]: I0913 01:37:44.569602 1924 state_mem.go:35] "Initializing new in-memory state store" Sep 13 01:37:44.582013 systemd[1]: Created slice kubepods.slice. Sep 13 01:37:44.587518 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 01:37:44.590799 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 01:37:44.601217 kubelet[1924]: I0913 01:37:44.601164 1924 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 01:37:44.600000 audit[1924]: AVC avc: denied { mac_admin } for pid=1924 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:44.600000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:37:44.600000 audit[1924]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a7e4b0 a1=4000aef830 a2=4000a7e480 a3=25 items=0 ppid=1 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.600000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:37:44.601860 kubelet[1924]: I0913 01:37:44.601572 1924 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 01:37:44.602523 kubelet[1924]: I0913 01:37:44.602176 1924 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 01:37:44.602523 kubelet[1924]: I0913 01:37:44.602200 1924 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 01:37:44.605136 kubelet[1924]: I0913 01:37:44.604937 1924 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 01:37:44.605489 kubelet[1924]: E0913 01:37:44.605453 1924 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.39\" not found" Sep 13 01:37:44.609000 audit[1951]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.609000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff215f050 a2=0 a3=1 items=0 ppid=1924 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 01:37:44.611769 kubelet[1924]: I0913 01:37:44.611711 1924 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 01:37:44.611000 audit[1952]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:44.611000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd402c140 a2=0 a3=1 items=0 ppid=1924 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:37:44.613337 kubelet[1924]: I0913 01:37:44.613276 1924 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 01:37:44.613337 kubelet[1924]: I0913 01:37:44.613307 1924 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 13 01:37:44.613337 kubelet[1924]: I0913 01:37:44.613328 1924 kubelet.go:2321] "Starting kubelet main sync loop" Sep 13 01:37:44.613490 kubelet[1924]: E0913 01:37:44.613454 1924 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 01:37:44.612000 audit[1953]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.612000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3e911f0 a2=0 a3=1 items=0 ppid=1924 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:37:44.615000 audit[1955]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.615000 audit[1955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffef6fc3d0 a2=0 a3=1 items=0 ppid=1924 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:37:44.616000 audit[1954]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:44.616000 audit[1954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd4dba8a0 a2=0 a3=1 items=0 ppid=1924 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:37:44.618000 audit[1957]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:44.618000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcf0f00e0 a2=0 a3=1 items=0 ppid=1924 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:37:44.618000 audit[1956]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:44.618000 audit[1956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0a85090 a2=0 a3=1 items=0 ppid=1924 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:37:44.619000 audit[1958]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:44.619000 audit[1958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcc0c3ce0 a2=0 a3=1 items=0 ppid=1924 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:44.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:37:44.703148 kubelet[1924]: I0913 01:37:44.703120 1924 kubelet_node_status.go:72] "Attempting to register node" node="10.200.20.39" Sep 13 01:37:44.716291 kubelet[1924]: I0913 01:37:44.716254 1924 kubelet_node_status.go:75] "Successfully registered node" node="10.200.20.39" Sep 13 01:37:44.716468 kubelet[1924]: E0913 01:37:44.716453 1924 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.200.20.39\": node \"10.200.20.39\" not found" Sep 13 01:37:44.724880 kubelet[1924]: I0913 01:37:44.724844 1924 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 01:37:44.725373 env[1495]: time="2025-09-13T01:37:44.725326310Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 01:37:44.725835 kubelet[1924]: I0913 01:37:44.725812 1924 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 01:37:44.737583 kubelet[1924]: E0913 01:37:44.737535 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:44.837983 kubelet[1924]: E0913 01:37:44.837941 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:44.938392 kubelet[1924]: E0913 01:37:44.938359 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:44.973134 update_engine[1466]: I0913 01:37:44.972625 1466 update_attempter.cc:509] Updating boot flags... Sep 13 01:37:45.002651 sudo[1801]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:45.001000 audit[1801]: USER_END pid=1801 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:45.002000 audit[1801]: CRED_DISP pid=1801 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:45.038975 kubelet[1924]: E0913 01:37:45.038924 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.068334 sshd[1798]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:45.068000 audit[1798]: USER_END pid=1798 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:45.068000 audit[1798]: CRED_DISP pid=1798 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:45.071436 systemd[1]: sshd@6-10.200.20.39:22-10.200.16.10:55004.service: Deactivated successfully. Sep 13 01:37:45.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.16.10:55004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:45.072211 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 01:37:45.072931 systemd-logind[1465]: Session 9 logged out. Waiting for processes to exit. Sep 13 01:37:45.074124 systemd-logind[1465]: Removed session 9. Sep 13 01:37:45.139825 kubelet[1924]: E0913 01:37:45.139767 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.240915 kubelet[1924]: E0913 01:37:45.240762 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.341362 kubelet[1924]: E0913 01:37:45.341287 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.441835 kubelet[1924]: E0913 01:37:45.441780 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.467058 kubelet[1924]: I0913 01:37:45.467017 1924 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 01:37:45.467274 kubelet[1924]: W0913 01:37:45.467207 1924 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 01:37:45.467274 kubelet[1924]: W0913 01:37:45.467243 1924 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 01:37:45.467274 kubelet[1924]: W0913 01:37:45.467264 1924 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 01:37:45.512987 kubelet[1924]: E0913 01:37:45.512459 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:45.542349 kubelet[1924]: E0913 01:37:45.542305 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.643196 kubelet[1924]: E0913 01:37:45.643155 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.743654 kubelet[1924]: E0913 01:37:45.743613 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:45.844500 kubelet[1924]: E0913 01:37:45.844049 1924 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.39\" not found" Sep 13 01:37:46.511939 kubelet[1924]: I0913 01:37:46.511896 1924 apiserver.go:52] "Watching apiserver" Sep 13 01:37:46.513284 kubelet[1924]: E0913 01:37:46.513233 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:46.519300 kubelet[1924]: E0913 01:37:46.519246 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:37:46.523433 systemd[1]: Created slice kubepods-besteffort-pode892a117_11d0_496e_9803_dc97c7dd1247.slice. Sep 13 01:37:46.536959 kubelet[1924]: I0913 01:37:46.536915 1924 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 13 01:37:46.539499 systemd[1]: Created slice kubepods-besteffort-podeceaa1e6_15dd_46eb_9c8a_577c03725d28.slice. Sep 13 01:37:46.547298 kubelet[1924]: I0913 01:37:46.547258 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/eceaa1e6-15dd-46eb-9c8a-577c03725d28-kube-proxy\") pod \"kube-proxy-hlgx8\" (UID: \"eceaa1e6-15dd-46eb-9c8a-577c03725d28\") " pod="kube-system/kube-proxy-hlgx8" Sep 13 01:37:46.547447 kubelet[1924]: I0913 01:37:46.547343 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p66mr\" (UniqueName: \"kubernetes.io/projected/eceaa1e6-15dd-46eb-9c8a-577c03725d28-kube-api-access-p66mr\") pod \"kube-proxy-hlgx8\" (UID: \"eceaa1e6-15dd-46eb-9c8a-577c03725d28\") " pod="kube-system/kube-proxy-hlgx8" Sep 13 01:37:46.547447 kubelet[1924]: I0913 01:37:46.547390 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c4d2a599-64f5-4d60-a88a-7897e3ca7370-kubelet-dir\") pod \"csi-node-driver-w6qfm\" (UID: \"c4d2a599-64f5-4d60-a88a-7897e3ca7370\") " pod="calico-system/csi-node-driver-w6qfm" Sep 13 01:37:46.547447 kubelet[1924]: I0913 01:37:46.547409 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c4d2a599-64f5-4d60-a88a-7897e3ca7370-registration-dir\") pod \"csi-node-driver-w6qfm\" (UID: \"c4d2a599-64f5-4d60-a88a-7897e3ca7370\") " pod="calico-system/csi-node-driver-w6qfm" Sep 13 01:37:46.547447 kubelet[1924]: I0913 01:37:46.547425 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e892a117-11d0-496e-9803-dc97c7dd1247-node-certs\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547550 kubelet[1924]: I0913 01:37:46.547476 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-xtables-lock\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547550 kubelet[1924]: I0913 01:37:46.547493 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jmxql\" (UniqueName: \"kubernetes.io/projected/e892a117-11d0-496e-9803-dc97c7dd1247-kube-api-access-jmxql\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547550 kubelet[1924]: I0913 01:37:46.547508 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-lib-modules\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547550 kubelet[1924]: I0913 01:37:46.547548 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-policysync\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547641 kubelet[1924]: I0913 01:37:46.547565 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-var-lib-calico\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547641 kubelet[1924]: I0913 01:37:46.547585 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-var-run-calico\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547641 kubelet[1924]: I0913 01:37:46.547629 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c4d2a599-64f5-4d60-a88a-7897e3ca7370-socket-dir\") pod \"csi-node-driver-w6qfm\" (UID: \"c4d2a599-64f5-4d60-a88a-7897e3ca7370\") " pod="calico-system/csi-node-driver-w6qfm" Sep 13 01:37:46.547709 kubelet[1924]: I0913 01:37:46.547645 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-cni-bin-dir\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547709 kubelet[1924]: I0913 01:37:46.547665 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-cni-log-dir\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547709 kubelet[1924]: I0913 01:37:46.547705 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-cni-net-dir\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547775 kubelet[1924]: I0913 01:37:46.547722 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c4d2a599-64f5-4d60-a88a-7897e3ca7370-varrun\") pod \"csi-node-driver-w6qfm\" (UID: \"c4d2a599-64f5-4d60-a88a-7897e3ca7370\") " pod="calico-system/csi-node-driver-w6qfm" Sep 13 01:37:46.547775 kubelet[1924]: I0913 01:37:46.547737 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eceaa1e6-15dd-46eb-9c8a-577c03725d28-xtables-lock\") pod \"kube-proxy-hlgx8\" (UID: \"eceaa1e6-15dd-46eb-9c8a-577c03725d28\") " pod="kube-system/kube-proxy-hlgx8" Sep 13 01:37:46.547823 kubelet[1924]: I0913 01:37:46.547780 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eceaa1e6-15dd-46eb-9c8a-577c03725d28-lib-modules\") pod \"kube-proxy-hlgx8\" (UID: \"eceaa1e6-15dd-46eb-9c8a-577c03725d28\") " pod="kube-system/kube-proxy-hlgx8" Sep 13 01:37:46.547823 kubelet[1924]: I0913 01:37:46.547796 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e892a117-11d0-496e-9803-dc97c7dd1247-flexvol-driver-host\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547823 kubelet[1924]: I0913 01:37:46.547811 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e892a117-11d0-496e-9803-dc97c7dd1247-tigera-ca-bundle\") pod \"calico-node-r7fxf\" (UID: \"e892a117-11d0-496e-9803-dc97c7dd1247\") " pod="calico-system/calico-node-r7fxf" Sep 13 01:37:46.547886 kubelet[1924]: I0913 01:37:46.547856 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x7wkr\" (UniqueName: \"kubernetes.io/projected/c4d2a599-64f5-4d60-a88a-7897e3ca7370-kube-api-access-x7wkr\") pod \"csi-node-driver-w6qfm\" (UID: \"c4d2a599-64f5-4d60-a88a-7897e3ca7370\") " pod="calico-system/csi-node-driver-w6qfm" Sep 13 01:37:46.648984 kubelet[1924]: I0913 01:37:46.648948 1924 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 01:37:46.651420 kubelet[1924]: E0913 01:37:46.651379 1924 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:46.651420 kubelet[1924]: W0913 01:37:46.651406 1924 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:46.651592 kubelet[1924]: E0913 01:37:46.651431 1924 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:46.653717 kubelet[1924]: E0913 01:37:46.653693 1924 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:46.653869 kubelet[1924]: W0913 01:37:46.653852 1924 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:46.653947 kubelet[1924]: E0913 01:37:46.653934 1924 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:46.672451 kubelet[1924]: E0913 01:37:46.672390 1924 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:46.672451 kubelet[1924]: W0913 01:37:46.672423 1924 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:46.672451 kubelet[1924]: E0913 01:37:46.672450 1924 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:46.673171 kubelet[1924]: E0913 01:37:46.673143 1924 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:46.673171 kubelet[1924]: W0913 01:37:46.673163 1924 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:46.673171 kubelet[1924]: E0913 01:37:46.673177 1924 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:46.678718 kubelet[1924]: E0913 01:37:46.678684 1924 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:46.678718 kubelet[1924]: W0913 01:37:46.678709 1924 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:46.678718 kubelet[1924]: E0913 01:37:46.678729 1924 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:46.838854 env[1495]: time="2025-09-13T01:37:46.838042297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r7fxf,Uid:e892a117-11d0-496e-9803-dc97c7dd1247,Namespace:calico-system,Attempt:0,}" Sep 13 01:37:46.843197 env[1495]: time="2025-09-13T01:37:46.842972886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hlgx8,Uid:eceaa1e6-15dd-46eb-9c8a-577c03725d28,Namespace:kube-system,Attempt:0,}" Sep 13 01:37:47.513904 kubelet[1924]: E0913 01:37:47.513837 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:48.514781 kubelet[1924]: E0913 01:37:48.514725 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:48.614977 kubelet[1924]: E0913 01:37:48.614250 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:37:49.515176 kubelet[1924]: E0913 01:37:49.515116 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:50.515586 kubelet[1924]: E0913 01:37:50.515527 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:50.614876 kubelet[1924]: E0913 01:37:50.614826 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:37:50.877433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount473076469.mount: Deactivated successfully. Sep 13 01:37:50.925748 env[1495]: time="2025-09-13T01:37:50.925688380Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:50.929207 env[1495]: time="2025-09-13T01:37:50.929164516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:50.939278 env[1495]: time="2025-09-13T01:37:50.939234162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:50.947716 env[1495]: time="2025-09-13T01:37:50.947669200Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:50.957347 env[1495]: time="2025-09-13T01:37:50.957302924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:50.961821 env[1495]: time="2025-09-13T01:37:50.961773945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:50.975242 env[1495]: time="2025-09-13T01:37:50.975185406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:50.975830 env[1495]: time="2025-09-13T01:37:50.975800609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:51.052512 env[1495]: time="2025-09-13T01:37:51.052452223Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:37:51.052767 env[1495]: time="2025-09-13T01:37:51.052739904Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:37:51.052861 env[1495]: time="2025-09-13T01:37:51.052838944Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:37:51.054034 env[1495]: time="2025-09-13T01:37:51.053976349Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083 pid=2015 runtime=io.containerd.runc.v2 Sep 13 01:37:51.054721 env[1495]: time="2025-09-13T01:37:51.054656632Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:37:51.054721 env[1495]: time="2025-09-13T01:37:51.054698592Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:37:51.054856 env[1495]: time="2025-09-13T01:37:51.054709752Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:37:51.054856 env[1495]: time="2025-09-13T01:37:51.054822673Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb78849e060361fff2c0d38815ad0eab47b21c27cd93ad27446a9640dadadeaf pid=2026 runtime=io.containerd.runc.v2 Sep 13 01:37:51.077440 systemd[1]: Started cri-containerd-19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083.scope. Sep 13 01:37:51.083272 systemd[1]: Started cri-containerd-eb78849e060361fff2c0d38815ad0eab47b21c27cd93ad27446a9640dadadeaf.scope. Sep 13 01:37:51.111099 kernel: kauditd_printk_skb: 242 callbacks suppressed Sep 13 01:37:51.111256 kernel: audit: type=1400 audit(1757727471.100:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.147956 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 01:37:51.148061 kernel: audit: type=1400 audit(1757727471.100:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.148108 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 01:37:51.148131 kernel: audit: type=1400 audit(1757727471.100:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.167419 kernel: audit: backlog limit exceeded Sep 13 01:37:51.167559 kernel: audit: type=1400 audit(1757727471.100:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.189970 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 01:37:51.190130 kernel: audit: type=1400 audit(1757727471.100:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.213455 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.104000 audit: BPF prog-id=62 op=LOAD Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2015 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393633623337363134383866633863396533646638363464636162 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2015 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393633623337363134383866633863396533646638363464636162 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit: BPF prog-id=63 op=LOAD Sep 13 01:37:51.120000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2015 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393633623337363134383866633863396533646638363464636162 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit: BPF prog-id=64 op=LOAD Sep 13 01:37:51.120000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2015 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393633623337363134383866633863396533646638363464636162 Sep 13 01:37:51.120000 audit: BPF prog-id=64 op=UNLOAD Sep 13 01:37:51.120000 audit: BPF prog-id=63 op=UNLOAD Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.120000 audit: BPF prog-id=65 op=LOAD Sep 13 01:37:51.120000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2015 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139393633623337363134383866633863396533646638363464636162 Sep 13 01:37:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.215000 audit: BPF prog-id=66 op=LOAD Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2026 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373838343965303630333631666666326330643338383135616430 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2026 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373838343965303630333631666666326330643338383135616430 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit: BPF prog-id=67 op=LOAD Sep 13 01:37:51.220000 audit[2039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2026 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373838343965303630333631666666326330643338383135616430 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit: BPF prog-id=68 op=LOAD Sep 13 01:37:51.220000 audit[2039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2026 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373838343965303630333631666666326330643338383135616430 Sep 13 01:37:51.220000 audit: BPF prog-id=68 op=UNLOAD Sep 13 01:37:51.220000 audit: BPF prog-id=67 op=UNLOAD Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { perfmon } for pid=2039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit[2039]: AVC avc: denied { bpf } for pid=2039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.220000 audit: BPF prog-id=69 op=LOAD Sep 13 01:37:51.220000 audit[2039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2026 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373838343965303630333631666666326330643338383135616430 Sep 13 01:37:51.230307 env[1495]: time="2025-09-13T01:37:51.230250221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r7fxf,Uid:e892a117-11d0-496e-9803-dc97c7dd1247,Namespace:calico-system,Attempt:0,} returns sandbox id \"19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083\"" Sep 13 01:37:51.233449 env[1495]: time="2025-09-13T01:37:51.233391115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 01:37:51.238887 env[1495]: time="2025-09-13T01:37:51.238840698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hlgx8,Uid:eceaa1e6-15dd-46eb-9c8a-577c03725d28,Namespace:kube-system,Attempt:0,} returns sandbox id \"eb78849e060361fff2c0d38815ad0eab47b21c27cd93ad27446a9640dadadeaf\"" Sep 13 01:37:51.515777 kubelet[1924]: E0913 01:37:51.515730 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:52.516237 kubelet[1924]: E0913 01:37:52.516187 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:52.521754 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1120959472.mount: Deactivated successfully. Sep 13 01:37:52.615769 kubelet[1924]: E0913 01:37:52.615358 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:37:52.690205 env[1495]: time="2025-09-13T01:37:52.690142746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:52.703298 env[1495]: time="2025-09-13T01:37:52.703228838Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:52.708695 env[1495]: time="2025-09-13T01:37:52.708651460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:52.724608 env[1495]: time="2025-09-13T01:37:52.724561044Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:52.725724 env[1495]: time="2025-09-13T01:37:52.725688008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 13 01:37:52.727231 env[1495]: time="2025-09-13T01:37:52.727184534Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\"" Sep 13 01:37:52.728770 env[1495]: time="2025-09-13T01:37:52.728724540Z" level=info msg="CreateContainer within sandbox \"19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 01:37:52.766041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount479756004.mount: Deactivated successfully. Sep 13 01:37:52.797487 env[1495]: time="2025-09-13T01:37:52.797369655Z" level=info msg="CreateContainer within sandbox \"19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa\"" Sep 13 01:37:52.799995 env[1495]: time="2025-09-13T01:37:52.799960505Z" level=info msg="StartContainer for \"010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa\"" Sep 13 01:37:52.815868 systemd[1]: Started cri-containerd-010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa.scope. Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2015 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:52.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031306237626264643430656530343233316165636430343737383738 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.833000 audit: BPF prog-id=70 op=LOAD Sep 13 01:37:52.833000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2015 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:52.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031306237626264643430656530343233316165636430343737383738 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit: BPF prog-id=71 op=LOAD Sep 13 01:37:52.834000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2015 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:52.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031306237626264643430656530343233316165636430343737383738 Sep 13 01:37:52.834000 audit: BPF prog-id=71 op=UNLOAD Sep 13 01:37:52.834000 audit: BPF prog-id=70 op=UNLOAD Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:52.834000 audit: BPF prog-id=72 op=LOAD Sep 13 01:37:52.834000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2015 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:52.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031306237626264643430656530343233316165636430343737383738 Sep 13 01:37:52.859929 systemd[1]: cri-containerd-010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa.scope: Deactivated successfully. Sep 13 01:37:52.865108 env[1495]: time="2025-09-13T01:37:52.865044365Z" level=info msg="StartContainer for \"010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa\" returns successfully" Sep 13 01:37:52.864000 audit: BPF prog-id=72 op=UNLOAD Sep 13 01:37:52.887477 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa-rootfs.mount: Deactivated successfully. Sep 13 01:37:53.013185 env[1495]: time="2025-09-13T01:37:53.013060234Z" level=info msg="shim disconnected" id=010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa Sep 13 01:37:53.013185 env[1495]: time="2025-09-13T01:37:53.013185235Z" level=warning msg="cleaning up after shim disconnected" id=010b7bbdd40ee04231aecd04778789293f2fafb25cd3ddcb067d4ff8e209c1fa namespace=k8s.io Sep 13 01:37:53.013185 env[1495]: time="2025-09-13T01:37:53.013195675Z" level=info msg="cleaning up dead shim" Sep 13 01:37:53.021608 env[1495]: time="2025-09-13T01:37:53.021552306Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:37:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2135 runtime=io.containerd.runc.v2\n" Sep 13 01:37:53.517166 kubelet[1924]: E0913 01:37:53.517117 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:54.088568 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1991450830.mount: Deactivated successfully. Sep 13 01:37:54.517595 kubelet[1924]: E0913 01:37:54.517543 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:54.614874 kubelet[1924]: E0913 01:37:54.614815 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:37:54.617681 env[1495]: time="2025-09-13T01:37:54.617640987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.626339 env[1495]: time="2025-09-13T01:37:54.626293457Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c15699f0b7002450249485b10f20211982dfd2bec4d61c86c35acebc659e794e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.631388 env[1495]: time="2025-09-13T01:37:54.631345475Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.637022 env[1495]: time="2025-09-13T01:37:54.636984375Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.637844 env[1495]: time="2025-09-13T01:37:54.637812138Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\" returns image reference \"sha256:c15699f0b7002450249485b10f20211982dfd2bec4d61c86c35acebc659e794e\"" Sep 13 01:37:54.639832 env[1495]: time="2025-09-13T01:37:54.639800585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 01:37:54.640714 env[1495]: time="2025-09-13T01:37:54.640682428Z" level=info msg="CreateContainer within sandbox \"eb78849e060361fff2c0d38815ad0eab47b21c27cd93ad27446a9640dadadeaf\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 01:37:54.671362 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1199187970.mount: Deactivated successfully. Sep 13 01:37:54.677561 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount181659309.mount: Deactivated successfully. Sep 13 01:37:54.698981 env[1495]: time="2025-09-13T01:37:54.698918792Z" level=info msg="CreateContainer within sandbox \"eb78849e060361fff2c0d38815ad0eab47b21c27cd93ad27446a9640dadadeaf\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b05a3b6868ac703b5339a80c6578253b9f0bdb82b3c10e1288ad559900c59a09\"" Sep 13 01:37:54.699526 env[1495]: time="2025-09-13T01:37:54.699498074Z" level=info msg="StartContainer for \"b05a3b6868ac703b5339a80c6578253b9f0bdb82b3c10e1288ad559900c59a09\"" Sep 13 01:37:54.716794 systemd[1]: Started cri-containerd-b05a3b6868ac703b5339a80c6578253b9f0bdb82b3c10e1288ad559900c59a09.scope. Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2026 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356133623638363861633730336235333339613830633635373832 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit: BPF prog-id=73 op=LOAD Sep 13 01:37:54.736000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2026 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356133623638363861633730336235333339613830633635373832 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit: BPF prog-id=74 op=LOAD Sep 13 01:37:54.736000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2026 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356133623638363861633730336235333339613830633635373832 Sep 13 01:37:54.736000 audit: BPF prog-id=74 op=UNLOAD Sep 13 01:37:54.736000 audit: BPF prog-id=73 op=UNLOAD Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.736000 audit: BPF prog-id=75 op=LOAD Sep 13 01:37:54.736000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2026 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230356133623638363861633730336235333339613830633635373832 Sep 13 01:37:54.764008 env[1495]: time="2025-09-13T01:37:54.763965301Z" level=info msg="StartContainer for \"b05a3b6868ac703b5339a80c6578253b9f0bdb82b3c10e1288ad559900c59a09\" returns successfully" Sep 13 01:37:54.910000 audit[2218]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:54.910000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6e4d190 a2=0 a3=1 items=0 ppid=2170 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:37:54.914000 audit[2220]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:54.914000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe831d170 a2=0 a3=1 items=0 ppid=2170 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:37:54.915000 audit[2219]: NETFILTER_CFG table=mangle:19 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:54.915000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcf042210 a2=0 a3=1 items=0 ppid=2170 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:37:54.917000 audit[2222]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:54.917000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcafe6720 a2=0 a3=1 items=0 ppid=2170 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.917000 audit[2223]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:54.917000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb8ba310 a2=0 a3=1 items=0 ppid=2170 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:37:54.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:37:54.919000 audit[2224]: NETFILTER_CFG table=filter:22 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:54.919000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd86029b0 a2=0 a3=1 items=0 ppid=2170 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:37:55.014000 audit[2225]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.014000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe84acd60 a2=0 a3=1 items=0 ppid=2170 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:37:55.017000 audit[2227]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.017000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd76730a0 a2=0 a3=1 items=0 ppid=2170 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 01:37:55.021000 audit[2230]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.021000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcb60f3e0 a2=0 a3=1 items=0 ppid=2170 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 01:37:55.022000 audit[2231]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.022000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff48e8fb0 a2=0 a3=1 items=0 ppid=2170 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:37:55.025000 audit[2233]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.025000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe73546c0 a2=0 a3=1 items=0 ppid=2170 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:37:55.026000 audit[2234]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.026000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe043c100 a2=0 a3=1 items=0 ppid=2170 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:37:55.030000 audit[2236]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.030000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa975a80 a2=0 a3=1 items=0 ppid=2170 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:37:55.035000 audit[2239]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.035000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff24f7070 a2=0 a3=1 items=0 ppid=2170 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 01:37:55.037000 audit[2240]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.037000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3aed3a0 a2=0 a3=1 items=0 ppid=2170 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:37:55.039000 audit[2242]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.039000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc68ae3f0 a2=0 a3=1 items=0 ppid=2170 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:37:55.040000 audit[2243]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.040000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4e04e80 a2=0 a3=1 items=0 ppid=2170 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:37:55.043000 audit[2245]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.043000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcdd4e1e0 a2=0 a3=1 items=0 ppid=2170 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:37:55.047000 audit[2248]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.047000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd1930b20 a2=0 a3=1 items=0 ppid=2170 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:37:55.050000 audit[2251]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.050000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5629de0 a2=0 a3=1 items=0 ppid=2170 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:37:55.052000 audit[2252]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.052000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc4380b90 a2=0 a3=1 items=0 ppid=2170 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:37:55.054000 audit[2254]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.054000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc18712f0 a2=0 a3=1 items=0 ppid=2170 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:55.173000 audit[2258]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.173000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd35c00c0 a2=0 a3=1 items=0 ppid=2170 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:55.174000 audit[2259]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.174000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1acfa60 a2=0 a3=1 items=0 ppid=2170 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:37:55.178000 audit[2261]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:55.178000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff8d88610 a2=0 a3=1 items=0 ppid=2170 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:37:55.225000 audit[2267]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:37:55.225000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff2c0ce00 a2=0 a3=1 items=0 ppid=2170 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:55.355000 audit[2267]: NETFILTER_CFG table=nat:43 family=2 entries=79 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:37:55.355000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=38092 a0=3 a1=fffff2c0ce00 a2=0 a3=1 items=0 ppid=2170 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:55.396000 audit[2276]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.396000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff06d0240 a2=0 a3=1 items=0 ppid=2170 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:37:55.400000 audit[2278]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.400000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff407ae80 a2=0 a3=1 items=0 ppid=2170 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 01:37:55.403000 audit[2281]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.403000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe5630320 a2=0 a3=1 items=0 ppid=2170 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 01:37:55.405000 audit[2282]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.405000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfd9ddf0 a2=0 a3=1 items=0 ppid=2170 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:37:55.407000 audit[2284]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.407000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed3f2810 a2=0 a3=1 items=0 ppid=2170 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:37:55.409000 audit[2285]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.409000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec5e1f10 a2=0 a3=1 items=0 ppid=2170 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:37:55.411000 audit[2287]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.411000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffee453f90 a2=0 a3=1 items=0 ppid=2170 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 01:37:55.415000 audit[2290]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.415000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd15f73e0 a2=0 a3=1 items=0 ppid=2170 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:37:55.416000 audit[2291]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.416000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea7ef260 a2=0 a3=1 items=0 ppid=2170 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:37:55.419000 audit[2293]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.419000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc64874c0 a2=0 a3=1 items=0 ppid=2170 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:37:55.421000 audit[2294]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.421000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7f7cc70 a2=0 a3=1 items=0 ppid=2170 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:37:55.426000 audit[2296]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.426000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd0f892f0 a2=0 a3=1 items=0 ppid=2170 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:37:55.430000 audit[2299]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.430000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc98e680 a2=0 a3=1 items=0 ppid=2170 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:37:55.434000 audit[2302]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.434000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc72d7640 a2=0 a3=1 items=0 ppid=2170 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 01:37:55.436000 audit[2303]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.436000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe57a6df0 a2=0 a3=1 items=0 ppid=2170 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:37:55.438000 audit[2305]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.438000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd34a3c20 a2=0 a3=1 items=0 ppid=2170 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:55.442000 audit[2308]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.442000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff1e42480 a2=0 a3=1 items=0 ppid=2170 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:55.443000 audit[2309]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.443000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2f8f3c0 a2=0 a3=1 items=0 ppid=2170 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:37:55.445000 audit[2311]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.445000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdd421bc0 a2=0 a3=1 items=0 ppid=2170 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:37:55.447000 audit[2312]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.447000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff218f9a0 a2=0 a3=1 items=0 ppid=2170 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:37:55.449000 audit[2314]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.449000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffce68ed70 a2=0 a3=1 items=0 ppid=2170 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:55.453000 audit[2317]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:55.453000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc43a77c0 a2=0 a3=1 items=0 ppid=2170 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:55.456000 audit[2319]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:37:55.456000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffd04307f0 a2=0 a3=1 items=0 ppid=2170 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.456000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:55.457000 audit[2319]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:37:55.457000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd04307f0 a2=0 a3=1 items=0 ppid=2170 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:55.457000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:55.518637 kubelet[1924]: E0913 01:37:55.518576 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:55.651797 kubelet[1924]: I0913 01:37:55.651731 1924 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hlgx8" podStartSLOduration=8.253170316 podStartE2EDuration="11.651715153s" podCreationTimestamp="2025-09-13 01:37:44 +0000 UTC" firstStartedPulling="2025-09-13 01:37:51.240403785 +0000 UTC m=+7.774889279" lastFinishedPulling="2025-09-13 01:37:54.638948542 +0000 UTC m=+11.173434116" observedRunningTime="2025-09-13 01:37:55.651637073 +0000 UTC m=+12.186122567" watchObservedRunningTime="2025-09-13 01:37:55.651715153 +0000 UTC m=+12.186200647" Sep 13 01:37:56.519007 kubelet[1924]: E0913 01:37:56.518957 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:56.614336 kubelet[1924]: E0913 01:37:56.614273 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:37:57.351144 env[1495]: time="2025-09-13T01:37:57.351083364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:57.359735 env[1495]: time="2025-09-13T01:37:57.359664917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:57.366783 env[1495]: time="2025-09-13T01:37:57.366742498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:57.373267 env[1495]: time="2025-09-13T01:37:57.373209073Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:57.374003 env[1495]: time="2025-09-13T01:37:57.373968880Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 13 01:37:57.377314 env[1495]: time="2025-09-13T01:37:57.377268868Z" level=info msg="CreateContainer within sandbox \"19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 01:37:57.423557 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2598044790.mount: Deactivated successfully. Sep 13 01:37:57.458031 env[1495]: time="2025-09-13T01:37:57.457955399Z" level=info msg="CreateContainer within sandbox \"19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4\"" Sep 13 01:37:57.458633 env[1495]: time="2025-09-13T01:37:57.458587884Z" level=info msg="StartContainer for \"36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4\"" Sep 13 01:37:57.481693 systemd[1]: run-containerd-runc-k8s.io-36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4-runc.xHwOzS.mount: Deactivated successfully. Sep 13 01:37:57.485622 systemd[1]: Started cri-containerd-36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4.scope. Sep 13 01:37:57.521413 kernel: kauditd_printk_skb: 348 callbacks suppressed Sep 13 01:37:57.521590 kernel: audit: type=1400 audit(1757727477.496:536): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.496000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.522003 kubelet[1924]: E0913 01:37:57.521793 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:57.496000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2015 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:57.553683 kernel: audit: type=1300 audit(1757727477.496:536): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2015 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336646166343934626333663236613433366665313236376136316635 Sep 13 01:37:57.578776 kernel: audit: type=1327 audit(1757727477.496:536): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336646166343934626333663236613433366665313236376136316635 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.598474 kernel: audit: type=1400 audit(1757727477.502:537): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.617582 kernel: audit: type=1400 audit(1757727477.502:537): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.637098 kernel: audit: type=1400 audit(1757727477.502:537): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.656708 kernel: audit: type=1400 audit(1757727477.502:537): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.657226 env[1495]: time="2025-09-13T01:37:57.657176105Z" level=info msg="StartContainer for \"36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4\" returns successfully" Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.698742 kernel: audit: type=1400 audit(1757727477.502:537): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.698850 kernel: audit: type=1400 audit(1757727477.502:537): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.718807 kernel: audit: type=1400 audit(1757727477.502:537): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.502000 audit: BPF prog-id=76 op=LOAD Sep 13 01:37:57.502000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2015 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:57.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336646166343934626333663236613433366665313236376136316635 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit: BPF prog-id=77 op=LOAD Sep 13 01:37:57.520000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2015 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:57.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336646166343934626333663236613433366665313236376136316635 Sep 13 01:37:57.520000 audit: BPF prog-id=77 op=UNLOAD Sep 13 01:37:57.520000 audit: BPF prog-id=76 op=UNLOAD Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:57.520000 audit: BPF prog-id=78 op=LOAD Sep 13 01:37:57.520000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2015 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:57.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336646166343934626333663236613433366665313236376136316635 Sep 13 01:37:58.522364 kubelet[1924]: E0913 01:37:58.522324 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:58.614129 kubelet[1924]: E0913 01:37:58.614053 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:37:59.523486 kubelet[1924]: E0913 01:37:59.523434 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:59.573895 env[1495]: time="2025-09-13T01:37:59.573833339Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:37:59.576954 systemd[1]: cri-containerd-36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4.scope: Deactivated successfully. Sep 13 01:37:59.579000 audit: BPF prog-id=78 op=UNLOAD Sep 13 01:37:59.595895 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4-rootfs.mount: Deactivated successfully. Sep 13 01:37:59.634438 kubelet[1924]: I0913 01:37:59.634398 1924 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 13 01:38:00.333946 env[1495]: time="2025-09-13T01:38:00.333890500Z" level=info msg="shim disconnected" id=36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4 Sep 13 01:38:00.333946 env[1495]: time="2025-09-13T01:38:00.333945101Z" level=warning msg="cleaning up after shim disconnected" id=36daf494bc3f26a436fe1267a61f583cfe2bc4c6453830a167f5605256c9a7b4 namespace=k8s.io Sep 13 01:38:00.333946 env[1495]: time="2025-09-13T01:38:00.333955341Z" level=info msg="cleaning up dead shim" Sep 13 01:38:00.341766 env[1495]: time="2025-09-13T01:38:00.341721242Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:38:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2368 runtime=io.containerd.runc.v2\n" Sep 13 01:38:00.523939 kubelet[1924]: E0913 01:38:00.523877 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:00.619611 systemd[1]: Created slice kubepods-besteffort-podc4d2a599_64f5_4d60_a88a_7897e3ca7370.slice. Sep 13 01:38:00.622697 env[1495]: time="2025-09-13T01:38:00.622646494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w6qfm,Uid:c4d2a599-64f5-4d60-a88a-7897e3ca7370,Namespace:calico-system,Attempt:0,}" Sep 13 01:38:00.690009 env[1495]: time="2025-09-13T01:38:00.689961424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 01:38:00.730676 env[1495]: time="2025-09-13T01:38:00.730595824Z" level=error msg="Failed to destroy network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:00.732705 env[1495]: time="2025-09-13T01:38:00.732646801Z" level=error msg="encountered an error cleaning up failed sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:00.732889 env[1495]: time="2025-09-13T01:38:00.732860162Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w6qfm,Uid:c4d2a599-64f5-4d60-a88a-7897e3ca7370,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:00.733628 kubelet[1924]: E0913 01:38:00.733196 1924 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:00.733628 kubelet[1924]: E0913 01:38:00.733273 1924 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w6qfm" Sep 13 01:38:00.733628 kubelet[1924]: E0913 01:38:00.733296 1924 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w6qfm" Sep 13 01:38:00.733811 kubelet[1924]: E0913 01:38:00.733346 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-w6qfm_calico-system(c4d2a599-64f5-4d60-a88a-7897e3ca7370)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-w6qfm_calico-system(c4d2a599-64f5-4d60-a88a-7897e3ca7370)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:38:00.733666 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9-shm.mount: Deactivated successfully. Sep 13 01:38:01.524459 kubelet[1924]: E0913 01:38:01.524392 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:01.690461 kubelet[1924]: I0913 01:38:01.690428 1924 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:01.691262 env[1495]: time="2025-09-13T01:38:01.691227401Z" level=info msg="StopPodSandbox for \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\"" Sep 13 01:38:01.715389 env[1495]: time="2025-09-13T01:38:01.715330586Z" level=error msg="StopPodSandbox for \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\" failed" error="failed to destroy network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:01.715822 kubelet[1924]: E0913 01:38:01.715775 1924 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:01.715911 kubelet[1924]: E0913 01:38:01.715843 1924 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9"} Sep 13 01:38:01.715911 kubelet[1924]: E0913 01:38:01.715902 1924 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4d2a599-64f5-4d60-a88a-7897e3ca7370\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 01:38:01.716006 kubelet[1924]: E0913 01:38:01.715924 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4d2a599-64f5-4d60-a88a-7897e3ca7370\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w6qfm" podUID="c4d2a599-64f5-4d60-a88a-7897e3ca7370" Sep 13 01:38:02.525311 kubelet[1924]: E0913 01:38:02.525257 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:03.525810 kubelet[1924]: E0913 01:38:03.525752 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:04.505381 kubelet[1924]: E0913 01:38:04.505318 1924 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:04.526791 kubelet[1924]: E0913 01:38:04.526748 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:04.828407 systemd[1]: Created slice kubepods-besteffort-pod63253d6c_6331_43ec_aaff_d1312673cf88.slice. Sep 13 01:38:04.901385 kubelet[1924]: I0913 01:38:04.901324 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9m2r9\" (UniqueName: \"kubernetes.io/projected/63253d6c-6331-43ec-aaff-d1312673cf88-kube-api-access-9m2r9\") pod \"nginx-deployment-8587fbcb89-vgcbq\" (UID: \"63253d6c-6331-43ec-aaff-d1312673cf88\") " pod="default/nginx-deployment-8587fbcb89-vgcbq" Sep 13 01:38:05.134722 env[1495]: time="2025-09-13T01:38:05.134326002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-vgcbq,Uid:63253d6c-6331-43ec-aaff-d1312673cf88,Namespace:default,Attempt:0,}" Sep 13 01:38:05.527365 kubelet[1924]: E0913 01:38:05.527314 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:05.566156 env[1495]: time="2025-09-13T01:38:05.566057565Z" level=error msg="Failed to destroy network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:05.568156 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab-shm.mount: Deactivated successfully. Sep 13 01:38:05.568675 env[1495]: time="2025-09-13T01:38:05.568620343Z" level=error msg="encountered an error cleaning up failed sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:05.568832 env[1495]: time="2025-09-13T01:38:05.568803264Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-vgcbq,Uid:63253d6c-6331-43ec-aaff-d1312673cf88,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:05.569494 kubelet[1924]: E0913 01:38:05.569445 1924 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:05.569610 kubelet[1924]: E0913 01:38:05.569521 1924 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-vgcbq" Sep 13 01:38:05.569610 kubelet[1924]: E0913 01:38:05.569540 1924 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-vgcbq" Sep 13 01:38:05.569671 kubelet[1924]: E0913 01:38:05.569594 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-vgcbq_default(63253d6c-6331-43ec-aaff-d1312673cf88)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-vgcbq_default(63253d6c-6331-43ec-aaff-d1312673cf88)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-vgcbq" podUID="63253d6c-6331-43ec-aaff-d1312673cf88" Sep 13 01:38:05.697314 kubelet[1924]: I0913 01:38:05.696596 1924 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:05.697644 env[1495]: time="2025-09-13T01:38:05.697608828Z" level=info msg="StopPodSandbox for \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\"" Sep 13 01:38:05.744826 env[1495]: time="2025-09-13T01:38:05.744769952Z" level=error msg="StopPodSandbox for \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\" failed" error="failed to destroy network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:38:05.745396 kubelet[1924]: E0913 01:38:05.745230 1924 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:05.745396 kubelet[1924]: E0913 01:38:05.745294 1924 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab"} Sep 13 01:38:05.745396 kubelet[1924]: E0913 01:38:05.745328 1924 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"63253d6c-6331-43ec-aaff-d1312673cf88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 01:38:05.745396 kubelet[1924]: E0913 01:38:05.745364 1924 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"63253d6c-6331-43ec-aaff-d1312673cf88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-vgcbq" podUID="63253d6c-6331-43ec-aaff-d1312673cf88" Sep 13 01:38:05.991557 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount740340783.mount: Deactivated successfully. Sep 13 01:38:06.042375 env[1495]: time="2025-09-13T01:38:06.042305346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:06.058782 env[1495]: time="2025-09-13T01:38:06.058716856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:06.174576 env[1495]: time="2025-09-13T01:38:06.174527549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:06.432944 env[1495]: time="2025-09-13T01:38:06.432496152Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:06.433672 env[1495]: time="2025-09-13T01:38:06.433634680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 13 01:38:06.448250 env[1495]: time="2025-09-13T01:38:06.448204937Z" level=info msg="CreateContainer within sandbox \"19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 01:38:06.483561 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2055613944.mount: Deactivated successfully. Sep 13 01:38:06.502626 env[1495]: time="2025-09-13T01:38:06.502572140Z" level=info msg="CreateContainer within sandbox \"19963b3761488fc8c9e3df864dcab526e43d03583cb177e2a49a55765680e083\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fda0da91315f7205bc54c92708d327f6f1aa26728d34a2fcd41f3411f96fafd0\"" Sep 13 01:38:06.503679 env[1495]: time="2025-09-13T01:38:06.503643068Z" level=info msg="StartContainer for \"fda0da91315f7205bc54c92708d327f6f1aa26728d34a2fcd41f3411f96fafd0\"" Sep 13 01:38:06.525180 systemd[1]: Started cri-containerd-fda0da91315f7205bc54c92708d327f6f1aa26728d34a2fcd41f3411f96fafd0.scope. Sep 13 01:38:06.528248 kubelet[1924]: E0913 01:38:06.527508 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.548192 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 01:38:06.548317 kernel: audit: type=1400 audit(1757727486.541:543): avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2015 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.594151 kernel: audit: type=1300 audit(1757727486.541:543): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2015 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.594285 kernel: audit: type=1327 audit(1757727486.541:543): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613064613931333135663732303562633534633932373038643332 Sep 13 01:38:06.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613064613931333135663732303562633534633932373038643332 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.635093 kernel: audit: type=1400 audit(1757727486.541:544): avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.653654 kernel: audit: type=1400 audit(1757727486.541:544): avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.670742 kernel: audit: type=1400 audit(1757727486.541:544): avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.688722 kernel: audit: type=1400 audit(1757727486.541:544): avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.706599 kernel: audit: type=1400 audit(1757727486.541:544): avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.707518 env[1495]: time="2025-09-13T01:38:06.707480469Z" level=info msg="StartContainer for \"fda0da91315f7205bc54c92708d327f6f1aa26728d34a2fcd41f3411f96fafd0\" returns successfully" Sep 13 01:38:06.724355 kernel: audit: type=1400 audit(1757727486.541:544): avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.742627 kernel: audit: type=1400 audit(1757727486.541:544): avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.541000 audit: BPF prog-id=79 op=LOAD Sep 13 01:38:06.541000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2015 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613064613931333135663732303562633534633932373038643332 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.547000 audit: BPF prog-id=80 op=LOAD Sep 13 01:38:06.547000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2015 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613064613931333135663732303562633534633932373038643332 Sep 13 01:38:06.565000 audit: BPF prog-id=80 op=UNLOAD Sep 13 01:38:06.565000 audit: BPF prog-id=79 op=UNLOAD Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.565000 audit: BPF prog-id=81 op=LOAD Sep 13 01:38:06.565000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2015 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613064613931333135663732303562633534633932373038643332 Sep 13 01:38:06.766196 kubelet[1924]: I0913 01:38:06.765733 1924 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-r7fxf" podStartSLOduration=7.563482002 podStartE2EDuration="22.765698898s" podCreationTimestamp="2025-09-13 01:37:44 +0000 UTC" firstStartedPulling="2025-09-13 01:37:51.232533831 +0000 UTC m=+7.767019325" lastFinishedPulling="2025-09-13 01:38:06.434750727 +0000 UTC m=+22.969236221" observedRunningTime="2025-09-13 01:38:06.765584057 +0000 UTC m=+23.300069551" watchObservedRunningTime="2025-09-13 01:38:06.765698898 +0000 UTC m=+23.300184392" Sep 13 01:38:07.123897 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 01:38:07.124063 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 01:38:07.528023 kubelet[1924]: E0913 01:38:07.527969 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:07.765995 systemd[1]: run-containerd-runc-k8s.io-fda0da91315f7205bc54c92708d327f6f1aa26728d34a2fcd41f3411f96fafd0-runc.uBQmE2.mount: Deactivated successfully. Sep 13 01:38:08.416000 audit[2623]: AVC avc: denied { write } for pid=2623 comm="tee" name="fd" dev="proc" ino=18479 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:38:08.416000 audit[2623]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffecf297db a2=241 a3=1b6 items=1 ppid=2588 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.416000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 01:38:08.416000 audit: PATH item=0 name="/dev/fd/63" inode=18472 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:08.416000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:38:08.429000 audit[2633]: AVC avc: denied { write } for pid=2633 comm="tee" name="fd" dev="proc" ino=18490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:38:08.433000 audit[2643]: AVC avc: denied { write } for pid=2643 comm="tee" name="fd" dev="proc" ino=18494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:38:08.435000 audit[2645]: AVC avc: denied { write } for pid=2645 comm="tee" name="fd" dev="proc" ino=18497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:38:08.429000 audit[2633]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd1a977cc a2=241 a3=1b6 items=1 ppid=2602 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.429000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 01:38:08.429000 audit: PATH item=0 name="/dev/fd/63" inode=18480 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:08.429000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:38:08.440000 audit[2655]: AVC avc: denied { write } for pid=2655 comm="tee" name="fd" dev="proc" ino=18501 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:38:08.435000 audit[2645]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff088a7db a2=241 a3=1b6 items=1 ppid=2594 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.435000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 01:38:08.435000 audit: PATH item=0 name="/dev/fd/63" inode=17921 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:08.435000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:38:08.433000 audit[2643]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe123c7dc a2=241 a3=1b6 items=1 ppid=2589 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.433000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 01:38:08.433000 audit: PATH item=0 name="/dev/fd/63" inode=17920 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:08.433000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:38:08.440000 audit[2655]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7a237dd a2=241 a3=1b6 items=1 ppid=2597 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.440000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 01:38:08.440000 audit: PATH item=0 name="/dev/fd/63" inode=18491 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:08.440000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:38:08.448000 audit[2659]: AVC avc: denied { write } for pid=2659 comm="tee" name="fd" dev="proc" ino=17934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:38:08.448000 audit[2659]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5fcb7db a2=241 a3=1b6 items=1 ppid=2598 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.448000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 01:38:08.448000 audit: PATH item=0 name="/dev/fd/63" inode=17929 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:08.448000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:38:08.449000 audit[2652]: AVC avc: denied { write } for pid=2652 comm="tee" name="fd" dev="proc" ino=17938 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:38:08.449000 audit[2652]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff45157cb a2=241 a3=1b6 items=1 ppid=2592 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.449000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 01:38:08.449000 audit: PATH item=0 name="/dev/fd/63" inode=17926 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:08.449000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:38:08.528488 kubelet[1924]: E0913 01:38:08.528431 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.697000 audit: BPF prog-id=82 op=LOAD Sep 13 01:38:08.697000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7274308 a2=98 a3=ffffd72742f8 items=0 ppid=2595 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.697000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:38:08.698000 audit: BPF prog-id=82 op=UNLOAD Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.698000 audit: BPF prog-id=83 op=LOAD Sep 13 01:38:08.698000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd72741b8 a2=74 a3=95 items=0 ppid=2595 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.698000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:38:08.699000 audit: BPF prog-id=83 op=UNLOAD Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit: BPF prog-id=84 op=LOAD Sep 13 01:38:08.699000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd72741e8 a2=40 a3=ffffd7274218 items=0 ppid=2595 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.699000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:38:08.699000 audit: BPF prog-id=84 op=UNLOAD Sep 13 01:38:08.699000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.699000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd7274300 a2=50 a3=0 items=0 ppid=2595 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.699000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.701000 audit: BPF prog-id=85 op=LOAD Sep 13 01:38:08.701000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff866dc78 a2=98 a3=fffff866dc68 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.701000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.702000 audit: BPF prog-id=85 op=UNLOAD Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.702000 audit: BPF prog-id=86 op=LOAD Sep 13 01:38:08.702000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff866d908 a2=74 a3=95 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.702000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.703000 audit: BPF prog-id=86 op=UNLOAD Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.703000 audit: BPF prog-id=87 op=LOAD Sep 13 01:38:08.703000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff866d968 a2=94 a3=2 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.703000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.704000 audit: BPF prog-id=87 op=UNLOAD Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.798000 audit: BPF prog-id=88 op=LOAD Sep 13 01:38:08.798000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff866d928 a2=40 a3=fffff866d958 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.799000 audit: BPF prog-id=88 op=UNLOAD Sep 13 01:38:08.799000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.799000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff866da40 a2=50 a3=0 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.809000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.809000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff866d998 a2=28 a3=fffff866dac8 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.809000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.809000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff866d9c8 a2=28 a3=fffff866daf8 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.809000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.809000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff866d878 a2=28 a3=fffff866d9a8 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.810000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.810000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff866d9e8 a2=28 a3=fffff866db18 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.810000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.810000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff866d9c8 a2=28 a3=fffff866daf8 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.810000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.810000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff866d9b8 a2=28 a3=fffff866dae8 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.810000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.810000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff866d9e8 a2=28 a3=fffff866db18 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.810000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.810000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff866d9c8 a2=28 a3=fffff866daf8 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.810000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.810000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff866d9e8 a2=28 a3=fffff866db18 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff866d9b8 a2=28 a3=fffff866dae8 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff866da38 a2=28 a3=fffff866db78 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff866d770 a2=50 a3=0 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.811000 audit: BPF prog-id=89 op=LOAD Sep 13 01:38:08.811000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff866d778 a2=94 a3=5 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.812000 audit: BPF prog-id=89 op=UNLOAD Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff866d880 a2=50 a3=0 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff866d9c8 a2=4 a3=3 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.812000 audit[2696]: AVC avc: denied { confidentiality } for pid=2696 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:08.812000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff866d9a8 a2=94 a3=6 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.813000 audit[2696]: AVC avc: denied { confidentiality } for pid=2696 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:08.813000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff866d178 a2=94 a3=83 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.814000 audit[2696]: AVC avc: denied { confidentiality } for pid=2696 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:08.814000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff866d178 a2=94 a3=83 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.814000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.824000 audit: BPF prog-id=90 op=LOAD Sep 13 01:38:08.824000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3dfb698 a2=98 a3=fffff3dfb688 items=0 ppid=2595 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.824000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:38:08.825000 audit: BPF prog-id=90 op=UNLOAD Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.825000 audit: BPF prog-id=91 op=LOAD Sep 13 01:38:08.825000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3dfb548 a2=74 a3=95 items=0 ppid=2595 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.825000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:38:08.826000 audit: BPF prog-id=91 op=UNLOAD Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:08.826000 audit: BPF prog-id=92 op=LOAD Sep 13 01:38:08.826000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3dfb578 a2=40 a3=fffff3dfb5a8 items=0 ppid=2595 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:08.826000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:38:08.826000 audit: BPF prog-id=92 op=UNLOAD Sep 13 01:38:08.983416 systemd-networkd[1632]: vxlan.calico: Link UP Sep 13 01:38:08.983424 systemd-networkd[1632]: vxlan.calico: Gained carrier Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit: BPF prog-id=93 op=LOAD Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbbbb7c8 a2=98 a3=ffffcbbbb7b8 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit: BPF prog-id=93 op=UNLOAD Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit: BPF prog-id=94 op=LOAD Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbbbb4a8 a2=74 a3=95 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit: BPF prog-id=94 op=UNLOAD Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit: BPF prog-id=95 op=LOAD Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbbbb508 a2=94 a3=2 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit: BPF prog-id=95 op=UNLOAD Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbbbb538 a2=28 a3=ffffcbbbb668 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbbbb568 a2=28 a3=ffffcbbbb698 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbbbb418 a2=28 a3=ffffcbbbb548 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbbbb588 a2=28 a3=ffffcbbbb6b8 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbbbb568 a2=28 a3=ffffcbbbb698 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbbbb558 a2=28 a3=ffffcbbbb688 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbbbb588 a2=28 a3=ffffcbbbb6b8 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbbbb568 a2=28 a3=ffffcbbbb698 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbbbb588 a2=28 a3=ffffcbbbb6b8 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbbbb558 a2=28 a3=ffffcbbbb688 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbbbb5d8 a2=28 a3=ffffcbbbb718 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.045000 audit: BPF prog-id=96 op=LOAD Sep 13 01:38:09.045000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbbbb3f8 a2=40 a3=ffffcbbbb428 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.045000 audit: BPF prog-id=96 op=UNLOAD Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcbbbb420 a2=50 a3=0 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcbbbb420 a2=50 a3=0 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit: BPF prog-id=97 op=LOAD Sep 13 01:38:09.046000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbbbab88 a2=94 a3=2 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.046000 audit: BPF prog-id=97 op=UNLOAD Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.046000 audit: BPF prog-id=98 op=LOAD Sep 13 01:38:09.046000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbbbad18 a2=94 a3=30 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit: BPF prog-id=99 op=LOAD Sep 13 01:38:09.056000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff7403b38 a2=98 a3=fffff7403b28 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.056000 audit: BPF prog-id=99 op=UNLOAD Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit: BPF prog-id=100 op=LOAD Sep 13 01:38:09.056000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff74037c8 a2=74 a3=95 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.056000 audit: BPF prog-id=100 op=UNLOAD Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.056000 audit: BPF prog-id=101 op=LOAD Sep 13 01:38:09.056000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff7403828 a2=94 a3=2 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.056000 audit: BPF prog-id=101 op=UNLOAD Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit: BPF prog-id=102 op=LOAD Sep 13 01:38:09.154000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff74037e8 a2=40 a3=fffff7403818 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.154000 audit: BPF prog-id=102 op=UNLOAD Sep 13 01:38:09.154000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.154000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff7403900 a2=50 a3=0 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7403858 a2=28 a3=fffff7403988 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7403888 a2=28 a3=fffff74039b8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7403738 a2=28 a3=fffff7403868 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff74038a8 a2=28 a3=fffff74039d8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7403888 a2=28 a3=fffff74039b8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7403878 a2=28 a3=fffff74039a8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff74038a8 a2=28 a3=fffff74039d8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7403888 a2=28 a3=fffff74039b8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff74038a8 a2=28 a3=fffff74039d8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7403878 a2=28 a3=fffff74039a8 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff74038f8 a2=28 a3=fffff7403a38 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff7403630 a2=50 a3=0 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.163000 audit: BPF prog-id=103 op=LOAD Sep 13 01:38:09.163000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff7403638 a2=94 a3=5 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.163000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit: BPF prog-id=103 op=UNLOAD Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff7403740 a2=50 a3=0 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff7403888 a2=4 a3=3 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { confidentiality } for pid=2733 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7403868 a2=94 a3=6 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { confidentiality } for pid=2733 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7403038 a2=94 a3=83 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { confidentiality } for pid=2733 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7403038 a2=94 a3=83 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7404a78 a2=10 a3=fffff7404b68 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7404938 a2=10 a3=fffff7404a28 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff74048a8 a2=10 a3=fffff7404a28 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.164000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:09.164000 audit[2733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff74048a8 a2=10 a3=fffff7404a28 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.164000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:38:09.170000 audit: BPF prog-id=98 op=UNLOAD Sep 13 01:38:09.358000 audit[2756]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:09.358000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe5c87d40 a2=0 a3=ffff9b9b5fa8 items=0 ppid=2595 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.358000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:09.410000 audit[2755]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:09.410000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff83f1fa0 a2=0 a3=ffffb559cfa8 items=0 ppid=2595 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.410000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:09.414000 audit[2758]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:09.414000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffcf493d00 a2=0 a3=ffff9405bfa8 items=0 ppid=2595 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:09.465000 audit[2754]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:09.465000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffd5d81e20 a2=0 a3=ffff835c8fa8 items=0 ppid=2595 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:09.465000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:09.528768 kubelet[1924]: E0913 01:38:09.528718 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:10.529513 kubelet[1924]: E0913 01:38:10.529459 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:10.859276 systemd-networkd[1632]: vxlan.calico: Gained IPv6LL Sep 13 01:38:11.530025 kubelet[1924]: E0913 01:38:11.529985 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:12.531528 kubelet[1924]: E0913 01:38:12.531470 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:13.531765 kubelet[1924]: E0913 01:38:13.531723 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:14.533170 kubelet[1924]: E0913 01:38:14.533135 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:15.534161 kubelet[1924]: E0913 01:38:15.534116 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:16.535057 kubelet[1924]: E0913 01:38:16.535014 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:16.615713 env[1495]: time="2025-09-13T01:38:16.615575194Z" level=info msg="StopPodSandbox for \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\"" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.664 [INFO][2788] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.664 [INFO][2788] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" iface="eth0" netns="/var/run/netns/cni-8426b5aa-d8c1-c29e-9808-5e330db1d9a2" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.664 [INFO][2788] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" iface="eth0" netns="/var/run/netns/cni-8426b5aa-d8c1-c29e-9808-5e330db1d9a2" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.665 [INFO][2788] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" iface="eth0" netns="/var/run/netns/cni-8426b5aa-d8c1-c29e-9808-5e330db1d9a2" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.665 [INFO][2788] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.665 [INFO][2788] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.685 [INFO][2795] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.685 [INFO][2795] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.685 [INFO][2795] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.696 [WARNING][2795] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.696 [INFO][2795] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.699 [INFO][2795] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:16.702937 env[1495]: 2025-09-13 01:38:16.701 [INFO][2788] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:16.705552 env[1495]: time="2025-09-13T01:38:16.704861172Z" level=info msg="TearDown network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\" successfully" Sep 13 01:38:16.705552 env[1495]: time="2025-09-13T01:38:16.704902772Z" level=info msg="StopPodSandbox for \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\" returns successfully" Sep 13 01:38:16.704769 systemd[1]: run-netns-cni\x2d8426b5aa\x2dd8c1\x2dc29e\x2d9808\x2d5e330db1d9a2.mount: Deactivated successfully. Sep 13 01:38:16.706570 env[1495]: time="2025-09-13T01:38:16.706534501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w6qfm,Uid:c4d2a599-64f5-4d60-a88a-7897e3ca7370,Namespace:calico-system,Attempt:1,}" Sep 13 01:38:16.877068 systemd-networkd[1632]: califb186a060a1: Link UP Sep 13 01:38:16.891769 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:38:16.891893 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califb186a060a1: link becomes ready Sep 13 01:38:16.894350 systemd-networkd[1632]: califb186a060a1: Gained carrier Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.794 [INFO][2801] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-csi--node--driver--w6qfm-eth0 csi-node-driver- calico-system c4d2a599-64f5-4d60-a88a-7897e3ca7370 1494 0 2025-09-13 01:37:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.39 csi-node-driver-w6qfm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] califb186a060a1 [] [] }} ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.794 [INFO][2801] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.818 [INFO][2814] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" HandleID="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.818 [INFO][2814] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" HandleID="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c2ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.39", "pod":"csi-node-driver-w6qfm", "timestamp":"2025-09-13 01:38:16.818326994 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.818 [INFO][2814] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.818 [INFO][2814] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.818 [INFO][2814] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.832 [INFO][2814] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.836 [INFO][2814] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.840 [INFO][2814] ipam/ipam.go 511: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.842 [INFO][2814] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.845 [INFO][2814] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.845 [INFO][2814] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.847 [INFO][2814] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514 Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.852 [INFO][2814] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.868 [INFO][2814] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.1/26] block=192.168.99.0/26 handle="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.868 [INFO][2814] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.1/26] handle="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" host="10.200.20.39" Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.868 [INFO][2814] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:16.914450 env[1495]: 2025-09-13 01:38:16.868 [INFO][2814] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.1/26] IPv6=[] ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" HandleID="k8s-pod-network.34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.915135 env[1495]: 2025-09-13 01:38:16.870 [INFO][2801] cni-plugin/k8s.go 418: Populated endpoint ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--w6qfm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4d2a599-64f5-4d60-a88a-7897e3ca7370", ResourceVersion:"1494", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"csi-node-driver-w6qfm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb186a060a1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:16.915135 env[1495]: 2025-09-13 01:38:16.870 [INFO][2801] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.1/32] ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.915135 env[1495]: 2025-09-13 01:38:16.871 [INFO][2801] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califb186a060a1 ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.915135 env[1495]: 2025-09-13 01:38:16.893 [INFO][2801] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.915135 env[1495]: 2025-09-13 01:38:16.896 [INFO][2801] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--w6qfm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4d2a599-64f5-4d60-a88a-7897e3ca7370", ResourceVersion:"1494", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514", Pod:"csi-node-driver-w6qfm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb186a060a1", MAC:"2a:1b:90:c5:2c:f0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:16.915135 env[1495]: 2025-09-13 01:38:16.911 [INFO][2801] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514" Namespace="calico-system" Pod="csi-node-driver-w6qfm" WorkloadEndpoint="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:16.930111 env[1495]: time="2025-09-13T01:38:16.929982007Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:38:16.930111 env[1495]: time="2025-09-13T01:38:16.930029727Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:38:16.931150 env[1495]: time="2025-09-13T01:38:16.930040607Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:38:16.931150 env[1495]: time="2025-09-13T01:38:16.930360848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514 pid=2841 runtime=io.containerd.runc.v2 Sep 13 01:38:16.953791 systemd[1]: Started cri-containerd-34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514.scope. Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.972937 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 13 01:38:16.973185 kernel: audit: type=1400 audit(1757727496.966:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.993131 kernel: audit: type=1400 audit(1757727496.966:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.032281 kernel: audit: type=1400 audit(1757727496.966:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.050299 kernel: audit: type=1400 audit(1757727496.966:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.053898 env[1495]: time="2025-09-13T01:38:17.053852195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w6qfm,Uid:c4d2a599-64f5-4d60-a88a-7897e3ca7370,Namespace:calico-system,Attempt:1,} returns sandbox id \"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514\"" Sep 13 01:38:17.055942 env[1495]: time="2025-09-13T01:38:17.055908246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 01:38:17.069797 kernel: audit: type=1400 audit(1757727496.966:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.087183 kernel: audit: type=1400 audit(1757727496.966:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.104976 kernel: audit: type=1400 audit(1757727496.966:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.122378 kernel: audit: type=1400 audit(1757727496.966:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.140140 kernel: audit: type=1400 audit(1757727496.966:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:17.140281 kernel: audit: type=1400 audit(1757727496.966:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit: BPF prog-id=104 op=LOAD Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:16.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643335306534656433616464636464383466623538376264373264 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:16.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643335306534656433616464636464383466623538376264373264 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.966000 audit: BPF prog-id=105 op=LOAD Sep 13 01:38:16.966000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:16.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643335306534656433616464636464383466623538376264373264 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.971000 audit: BPF prog-id=106 op=LOAD Sep 13 01:38:16.971000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:16.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643335306534656433616464636464383466623538376264373264 Sep 13 01:38:16.989000 audit: BPF prog-id=106 op=UNLOAD Sep 13 01:38:16.989000 audit: BPF prog-id=105 op=UNLOAD Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:16.989000 audit: BPF prog-id=107 op=LOAD Sep 13 01:38:16.989000 audit[2850]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2841 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:16.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643335306534656433616464636464383466623538376264373264 Sep 13 01:38:16.943000 audit[2831]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:16.943000 audit[2831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffe766a2e0 a2=0 a3=ffffae9ecfa8 items=0 ppid=2595 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:16.943000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:17.536383 kubelet[1924]: E0913 01:38:17.536331 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:17.704861 systemd[1]: run-containerd-runc-k8s.io-34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514-runc.scmsAl.mount: Deactivated successfully. Sep 13 01:38:17.963291 systemd-networkd[1632]: califb186a060a1: Gained IPv6LL Sep 13 01:38:18.414364 env[1495]: time="2025-09-13T01:38:18.414004183Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:18.423307 env[1495]: time="2025-09-13T01:38:18.423244308Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:18.427863 env[1495]: time="2025-09-13T01:38:18.427821010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:18.432887 env[1495]: time="2025-09-13T01:38:18.432843515Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:18.433743 env[1495]: time="2025-09-13T01:38:18.433711639Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 13 01:38:18.437334 env[1495]: time="2025-09-13T01:38:18.437291497Z" level=info msg="CreateContainer within sandbox \"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 01:38:18.479530 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3117732207.mount: Deactivated successfully. Sep 13 01:38:18.505522 env[1495]: time="2025-09-13T01:38:18.505469069Z" level=info msg="CreateContainer within sandbox \"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8179d6e1bbc5c8b06236524a6b0972f6ba6d307d3fd8c7ece9a6ab692508c694\"" Sep 13 01:38:18.506563 env[1495]: time="2025-09-13T01:38:18.506531674Z" level=info msg="StartContainer for \"8179d6e1bbc5c8b06236524a6b0972f6ba6d307d3fd8c7ece9a6ab692508c694\"" Sep 13 01:38:18.531661 systemd[1]: Started cri-containerd-8179d6e1bbc5c8b06236524a6b0972f6ba6d307d3fd8c7ece9a6ab692508c694.scope. Sep 13 01:38:18.536875 kubelet[1924]: E0913 01:38:18.536549 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:18.547000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.547000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2841 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:18.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831373964366531626263356338623036323336353234613662303937 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit: BPF prog-id=108 op=LOAD Sep 13 01:38:18.548000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2841 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:18.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831373964366531626263356338623036323336353234613662303937 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.548000 audit: BPF prog-id=109 op=LOAD Sep 13 01:38:18.548000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2841 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:18.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831373964366531626263356338623036323336353234613662303937 Sep 13 01:38:18.549000 audit: BPF prog-id=109 op=UNLOAD Sep 13 01:38:18.549000 audit: BPF prog-id=108 op=UNLOAD Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:18.549000 audit: BPF prog-id=110 op=LOAD Sep 13 01:38:18.549000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2841 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:18.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831373964366531626263356338623036323336353234613662303937 Sep 13 01:38:18.573397 env[1495]: time="2025-09-13T01:38:18.573338960Z" level=info msg="StartContainer for \"8179d6e1bbc5c8b06236524a6b0972f6ba6d307d3fd8c7ece9a6ab692508c694\" returns successfully" Sep 13 01:38:18.574618 env[1495]: time="2025-09-13T01:38:18.574586766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 01:38:18.704945 systemd[1]: run-containerd-runc-k8s.io-8179d6e1bbc5c8b06236524a6b0972f6ba6d307d3fd8c7ece9a6ab692508c694-runc.opIMqE.mount: Deactivated successfully. Sep 13 01:38:19.537530 kubelet[1924]: E0913 01:38:19.537439 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:19.991479 env[1495]: time="2025-09-13T01:38:19.991432150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:19.998182 env[1495]: time="2025-09-13T01:38:19.998130142Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:20.002461 env[1495]: time="2025-09-13T01:38:20.002414602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:20.007108 env[1495]: time="2025-09-13T01:38:20.007054623Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:20.007728 env[1495]: time="2025-09-13T01:38:20.007697346Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 13 01:38:20.010514 env[1495]: time="2025-09-13T01:38:20.010480599Z" level=info msg="CreateContainer within sandbox \"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 01:38:20.061243 env[1495]: time="2025-09-13T01:38:20.061188434Z" level=info msg="CreateContainer within sandbox \"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c69843fd73ac48c42837bc2fd2daeda72c2dc8396706889b7c2deed4ef9210a7\"" Sep 13 01:38:20.061837 env[1495]: time="2025-09-13T01:38:20.061783637Z" level=info msg="StartContainer for \"c69843fd73ac48c42837bc2fd2daeda72c2dc8396706889b7c2deed4ef9210a7\"" Sep 13 01:38:20.089135 systemd[1]: run-containerd-runc-k8s.io-c69843fd73ac48c42837bc2fd2daeda72c2dc8396706889b7c2deed4ef9210a7-runc.lcz2uz.mount: Deactivated successfully. Sep 13 01:38:20.090625 systemd[1]: Started cri-containerd-c69843fd73ac48c42837bc2fd2daeda72c2dc8396706889b7c2deed4ef9210a7.scope. Sep 13 01:38:20.108000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.108000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2841 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336393834336664373361633438633432383337626332666432646165 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit: BPF prog-id=111 op=LOAD Sep 13 01:38:20.109000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2841 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336393834336664373361633438633432383337626332666432646165 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.109000 audit: BPF prog-id=112 op=LOAD Sep 13 01:38:20.109000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2841 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336393834336664373361633438633432383337626332666432646165 Sep 13 01:38:20.110000 audit: BPF prog-id=112 op=UNLOAD Sep 13 01:38:20.110000 audit: BPF prog-id=111 op=UNLOAD Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.110000 audit: BPF prog-id=113 op=LOAD Sep 13 01:38:20.110000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2841 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336393834336664373361633438633432383337626332666432646165 Sep 13 01:38:20.132669 env[1495]: time="2025-09-13T01:38:20.132613605Z" level=info msg="StartContainer for \"c69843fd73ac48c42837bc2fd2daeda72c2dc8396706889b7c2deed4ef9210a7\" returns successfully" Sep 13 01:38:20.538529 kubelet[1924]: E0913 01:38:20.538476 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:20.616126 env[1495]: time="2025-09-13T01:38:20.616058445Z" level=info msg="StopPodSandbox for \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\"" Sep 13 01:38:20.633914 kubelet[1924]: I0913 01:38:20.633872 1924 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 01:38:20.633914 kubelet[1924]: I0913 01:38:20.633912 1924 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.679 [INFO][2962] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.680 [INFO][2962] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" iface="eth0" netns="/var/run/netns/cni-6723f49b-bb20-2bd5-4c65-da202cb18329" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.680 [INFO][2962] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" iface="eth0" netns="/var/run/netns/cni-6723f49b-bb20-2bd5-4c65-da202cb18329" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.680 [INFO][2962] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" iface="eth0" netns="/var/run/netns/cni-6723f49b-bb20-2bd5-4c65-da202cb18329" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.680 [INFO][2962] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.680 [INFO][2962] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.698 [INFO][2970] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.698 [INFO][2970] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.698 [INFO][2970] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.708 [WARNING][2970] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.708 [INFO][2970] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.710 [INFO][2970] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:20.712819 env[1495]: 2025-09-13 01:38:20.711 [INFO][2962] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:20.713550 env[1495]: time="2025-09-13T01:38:20.713510857Z" level=info msg="TearDown network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\" successfully" Sep 13 01:38:20.713629 env[1495]: time="2025-09-13T01:38:20.713612497Z" level=info msg="StopPodSandbox for \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\" returns successfully" Sep 13 01:38:20.714550 env[1495]: time="2025-09-13T01:38:20.714502622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-vgcbq,Uid:63253d6c-6331-43ec-aaff-d1312673cf88,Namespace:default,Attempt:1,}" Sep 13 01:38:20.901198 systemd-networkd[1632]: califa310f53993: Link UP Sep 13 01:38:20.914131 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:38:20.914230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califa310f53993: link becomes ready Sep 13 01:38:20.914695 systemd-networkd[1632]: califa310f53993: Gained carrier Sep 13 01:38:20.929794 kubelet[1924]: I0913 01:38:20.929730 1924 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-w6qfm" podStartSLOduration=33.976274591 podStartE2EDuration="36.929708459s" podCreationTimestamp="2025-09-13 01:37:44 +0000 UTC" firstStartedPulling="2025-09-13 01:38:17.055340803 +0000 UTC m=+33.589826297" lastFinishedPulling="2025-09-13 01:38:20.008774711 +0000 UTC m=+36.543260165" observedRunningTime="2025-09-13 01:38:20.795025635 +0000 UTC m=+37.329511129" watchObservedRunningTime="2025-09-13 01:38:20.929708459 +0000 UTC m=+37.464193953" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.795 [INFO][2976] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0 nginx-deployment-8587fbcb89- default 63253d6c-6331-43ec-aaff-d1312673cf88 1518 0 2025-09-13 01:38:04 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.39 nginx-deployment-8587fbcb89-vgcbq eth0 default [] [] [kns.default ksa.default.default] califa310f53993 [] [] }} ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.795 [INFO][2976] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.829 [INFO][2990] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" HandleID="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.829 [INFO][2990] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" HandleID="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dcff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.39", "pod":"nginx-deployment-8587fbcb89-vgcbq", "timestamp":"2025-09-13 01:38:20.829328754 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.829 [INFO][2990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.829 [INFO][2990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.829 [INFO][2990] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.847 [INFO][2990] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.856 [INFO][2990] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.863 [INFO][2990] ipam/ipam.go 511: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.865 [INFO][2990] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.868 [INFO][2990] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.868 [INFO][2990] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.870 [INFO][2990] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52 Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.883 [INFO][2990] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.894 [INFO][2990] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.2/26] block=192.168.99.0/26 handle="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.894 [INFO][2990] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.2/26] handle="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" host="10.200.20.39" Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.894 [INFO][2990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:20.934806 env[1495]: 2025-09-13 01:38:20.894 [INFO][2990] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.2/26] IPv6=[] ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" HandleID="k8s-pod-network.aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.935415 env[1495]: 2025-09-13 01:38:20.896 [INFO][2976] cni-plugin/k8s.go 418: Populated endpoint ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"63253d6c-6331-43ec-aaff-d1312673cf88", ResourceVersion:"1518", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-vgcbq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califa310f53993", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:20.935415 env[1495]: 2025-09-13 01:38:20.896 [INFO][2976] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.2/32] ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.935415 env[1495]: 2025-09-13 01:38:20.896 [INFO][2976] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califa310f53993 ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.935415 env[1495]: 2025-09-13 01:38:20.915 [INFO][2976] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.935415 env[1495]: 2025-09-13 01:38:20.915 [INFO][2976] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"63253d6c-6331-43ec-aaff-d1312673cf88", ResourceVersion:"1518", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52", Pod:"nginx-deployment-8587fbcb89-vgcbq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califa310f53993", MAC:"32:18:73:7e:f5:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:20.935415 env[1495]: 2025-09-13 01:38:20.930 [INFO][2976] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52" Namespace="default" Pod="nginx-deployment-8587fbcb89-vgcbq" WorkloadEndpoint="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:20.942000 audit[3006]: NETFILTER_CFG table=filter:73 family=2 entries=42 op=nft_register_chain pid=3006 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:20.942000 audit[3006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffe0be12e0 a2=0 a3=ffff90784fa8 items=0 ppid=2595 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.942000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:20.952626 env[1495]: time="2025-09-13T01:38:20.952553325Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:38:20.952838 env[1495]: time="2025-09-13T01:38:20.952812206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:38:20.952955 env[1495]: time="2025-09-13T01:38:20.952931526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:38:20.953314 env[1495]: time="2025-09-13T01:38:20.953282328Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52 pid=3015 runtime=io.containerd.runc.v2 Sep 13 01:38:20.964536 systemd[1]: Started cri-containerd-aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52.scope. Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.980000 audit: BPF prog-id=114 op=LOAD Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3015 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613331313363346533316436663665343166373038333565316666 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3015 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613331313363346533316436663665343166373038333565316666 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit: BPF prog-id=115 op=LOAD Sep 13 01:38:20.981000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3015 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613331313363346533316436663665343166373038333565316666 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit: BPF prog-id=116 op=LOAD Sep 13 01:38:20.981000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3015 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613331313363346533316436663665343166373038333565316666 Sep 13 01:38:20.981000 audit: BPF prog-id=116 op=UNLOAD Sep 13 01:38:20.981000 audit: BPF prog-id=115 op=UNLOAD Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:20.981000 audit: BPF prog-id=117 op=LOAD Sep 13 01:38:20.981000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3015 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613331313363346533316436663665343166373038333565316666 Sep 13 01:38:21.006334 env[1495]: time="2025-09-13T01:38:21.006281053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-vgcbq,Uid:63253d6c-6331-43ec-aaff-d1312673cf88,Namespace:default,Attempt:1,} returns sandbox id \"aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52\"" Sep 13 01:38:21.008373 env[1495]: time="2025-09-13T01:38:21.008321942Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:38:21.040445 systemd[1]: run-netns-cni\x2d6723f49b\x2dbb20\x2d2bd5\x2d4c65\x2dda202cb18329.mount: Deactivated successfully. Sep 13 01:38:21.539122 kubelet[1924]: E0913 01:38:21.539057 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:21.995567 systemd-networkd[1632]: califa310f53993: Gained IPv6LL Sep 13 01:38:22.539634 kubelet[1924]: E0913 01:38:22.539583 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:23.375159 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1383223219.mount: Deactivated successfully. Sep 13 01:38:23.539865 kubelet[1924]: E0913 01:38:23.539809 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:24.505712 kubelet[1924]: E0913 01:38:24.505653 1924 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:24.540265 kubelet[1924]: E0913 01:38:24.540208 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:24.696311 env[1495]: time="2025-09-13T01:38:24.696262858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:24.704145 env[1495]: time="2025-09-13T01:38:24.704062770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:24.710490 env[1495]: time="2025-09-13T01:38:24.710442917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:24.719801 env[1495]: time="2025-09-13T01:38:24.719754716Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:24.720319 env[1495]: time="2025-09-13T01:38:24.720282518Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 01:38:24.722993 env[1495]: time="2025-09-13T01:38:24.722863129Z" level=info msg="CreateContainer within sandbox \"aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 01:38:24.758514 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4151799606.mount: Deactivated successfully. Sep 13 01:38:24.764830 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount837858463.mount: Deactivated successfully. Sep 13 01:38:24.777539 env[1495]: time="2025-09-13T01:38:24.777491599Z" level=info msg="CreateContainer within sandbox \"aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"a814da580a7c91cdceba7e285413ea710876cf39785adb3ad608519c03ea1cc8\"" Sep 13 01:38:24.778600 env[1495]: time="2025-09-13T01:38:24.778545883Z" level=info msg="StartContainer for \"a814da580a7c91cdceba7e285413ea710876cf39785adb3ad608519c03ea1cc8\"" Sep 13 01:38:24.798973 systemd[1]: Started cri-containerd-a814da580a7c91cdceba7e285413ea710876cf39785adb3ad608519c03ea1cc8.scope. Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.822170 kernel: kauditd_printk_skb: 196 callbacks suppressed Sep 13 01:38:24.822289 kernel: audit: type=1400 audit(1757727504.814:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.857487 kernel: audit: type=1400 audit(1757727504.814:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.857600 kernel: audit: type=1400 audit(1757727504.814:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.894319 kernel: audit: type=1400 audit(1757727504.814:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.895300 kernel: audit: type=1400 audit(1757727504.814:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.913299 kernel: audit: type=1400 audit(1757727504.814:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.952828 kernel: audit: type=1400 audit(1757727504.814:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.971236 kernel: audit: type=1400 audit(1757727504.814:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.971354 kernel: audit: type=1400 audit(1757727504.814:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.988223 env[1495]: time="2025-09-13T01:38:24.988180523Z" level=info msg="StartContainer for \"a814da580a7c91cdceba7e285413ea710876cf39785adb3ad608519c03ea1cc8\" returns successfully" Sep 13 01:38:25.005026 kernel: audit: type=1400 audit(1757727504.815:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit: BPF prog-id=118 op=LOAD Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3015 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:24.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313464613538306137633931636463656261376532383534313365 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3015 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:24.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313464613538306137633931636463656261376532383534313365 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.815000 audit: BPF prog-id=119 op=LOAD Sep 13 01:38:24.815000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3015 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:24.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313464613538306137633931636463656261376532383534313365 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.821000 audit: BPF prog-id=120 op=LOAD Sep 13 01:38:24.821000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3015 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:24.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313464613538306137633931636463656261376532383534313365 Sep 13 01:38:24.838000 audit: BPF prog-id=120 op=UNLOAD Sep 13 01:38:24.838000 audit: BPF prog-id=119 op=UNLOAD Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { perfmon } for pid=3057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit[3057]: AVC avc: denied { bpf } for pid=3057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:24.838000 audit: BPF prog-id=121 op=LOAD Sep 13 01:38:24.838000 audit[3057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3015 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:24.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313464613538306137633931636463656261376532383534313365 Sep 13 01:38:25.540417 kubelet[1924]: E0913 01:38:25.540375 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:25.797201 kubelet[1924]: I0913 01:38:25.796837 1924 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-vgcbq" podStartSLOduration=18.083373015 podStartE2EDuration="21.796819118s" podCreationTimestamp="2025-09-13 01:38:04 +0000 UTC" firstStartedPulling="2025-09-13 01:38:21.0079481 +0000 UTC m=+37.542433594" lastFinishedPulling="2025-09-13 01:38:24.721394203 +0000 UTC m=+41.255879697" observedRunningTime="2025-09-13 01:38:25.796795838 +0000 UTC m=+42.331281332" watchObservedRunningTime="2025-09-13 01:38:25.796819118 +0000 UTC m=+42.331304612" Sep 13 01:38:26.541388 kubelet[1924]: E0913 01:38:26.541333 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:27.541954 kubelet[1924]: E0913 01:38:27.541909 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:28.542957 kubelet[1924]: E0913 01:38:28.542918 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:29.543714 kubelet[1924]: E0913 01:38:29.543672 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:30.545081 kubelet[1924]: E0913 01:38:30.545025 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:31.545205 kubelet[1924]: E0913 01:38:31.545154 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:32.545518 kubelet[1924]: E0913 01:38:32.545477 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:33.279000 audit[3139]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.284503 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 01:38:33.284580 kernel: audit: type=1325 audit(1757727513.279:726): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.279000 audit[3139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffcb7377c0 a2=0 a3=1 items=0 ppid=2170 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.324725 kernel: audit: type=1300 audit(1757727513.279:726): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffcb7377c0 a2=0 a3=1 items=0 ppid=2170 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:33.338421 kernel: audit: type=1327 audit(1757727513.279:726): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:33.325000 audit[3139]: NETFILTER_CFG table=nat:75 family=2 entries=26 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.343230 systemd[1]: Created slice kubepods-besteffort-pod6fb78dbb_3c0c_47f7_a51b_fd2c788249cd.slice. Sep 13 01:38:33.352676 kernel: audit: type=1325 audit(1757727513.325:727): table=nat:75 family=2 entries=26 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.325000 audit[3139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffcb7377c0 a2=0 a3=1 items=0 ppid=2170 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.378935 kernel: audit: type=1300 audit(1757727513.325:727): arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffcb7377c0 a2=0 a3=1 items=0 ppid=2170 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.379217 kubelet[1924]: I0913 01:38:33.379151 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6fb78dbb-3c0c-47f7-a51b-fd2c788249cd-data\") pod \"nfs-server-provisioner-0\" (UID: \"6fb78dbb-3c0c-47f7-a51b-fd2c788249cd\") " pod="default/nfs-server-provisioner-0" Sep 13 01:38:33.379217 kubelet[1924]: I0913 01:38:33.379196 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t7p29\" (UniqueName: \"kubernetes.io/projected/6fb78dbb-3c0c-47f7-a51b-fd2c788249cd-kube-api-access-t7p29\") pod \"nfs-server-provisioner-0\" (UID: \"6fb78dbb-3c0c-47f7-a51b-fd2c788249cd\") " pod="default/nfs-server-provisioner-0" Sep 13 01:38:33.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:33.393271 kernel: audit: type=1327 audit(1757727513.325:727): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:33.398000 audit[3143]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.398000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff7c98940 a2=0 a3=1 items=0 ppid=2170 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.413185 kernel: audit: type=1325 audit(1757727513.398:728): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:33.454171 kernel: audit: type=1300 audit(1757727513.398:728): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff7c98940 a2=0 a3=1 items=0 ppid=2170 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.454276 kernel: audit: type=1327 audit(1757727513.398:728): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:33.440000 audit[3143]: NETFILTER_CFG table=nat:77 family=2 entries=26 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.467838 kernel: audit: type=1325 audit(1757727513.440:729): table=nat:77 family=2 entries=26 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:33.440000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=fffff7c98940 a2=0 a3=1 items=0 ppid=2170 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:33.546557 kubelet[1924]: E0913 01:38:33.546420 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:33.647126 env[1495]: time="2025-09-13T01:38:33.647047626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6fb78dbb-3c0c-47f7-a51b-fd2c788249cd,Namespace:default,Attempt:0,}" Sep 13 01:38:33.828263 systemd-networkd[1632]: cali60e51b789ff: Link UP Sep 13 01:38:33.842742 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:38:33.842843 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 01:38:33.844028 systemd-networkd[1632]: cali60e51b789ff: Gained carrier Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.738 [INFO][3145] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6fb78dbb-3c0c-47f7-a51b-fd2c788249cd 1578 0 2025-09-13 01:38:33 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.39 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.738 [INFO][3145] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.764 [INFO][3160] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" HandleID="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Workload="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.764 [INFO][3160] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" HandleID="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Workload="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3660), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.39", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 01:38:33.764252184 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.764 [INFO][3160] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.764 [INFO][3160] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.764 [INFO][3160] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.774 [INFO][3160] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.778 [INFO][3160] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.785 [INFO][3160] ipam/ipam.go 511: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.789 [INFO][3160] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.791 [INFO][3160] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.791 [INFO][3160] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.793 [INFO][3160] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893 Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.805 [INFO][3160] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.822 [INFO][3160] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.3/26] block=192.168.99.0/26 handle="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.822 [INFO][3160] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.3/26] handle="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" host="10.200.20.39" Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.822 [INFO][3160] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:33.858570 env[1495]: 2025-09-13 01:38:33.822 [INFO][3160] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.3/26] IPv6=[] ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" HandleID="k8s-pod-network.bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Workload="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:33.859312 env[1495]: 2025-09-13 01:38:33.824 [INFO][3145] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6fb78dbb-3c0c-47f7-a51b-fd2c788249cd", ResourceVersion:"1578", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:33.859312 env[1495]: 2025-09-13 01:38:33.824 [INFO][3145] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.3/32] ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:33.859312 env[1495]: 2025-09-13 01:38:33.824 [INFO][3145] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:33.859312 env[1495]: 2025-09-13 01:38:33.843 [INFO][3145] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:33.859464 env[1495]: 2025-09-13 01:38:33.845 [INFO][3145] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6fb78dbb-3c0c-47f7-a51b-fd2c788249cd", ResourceVersion:"1578", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"b6:15:0e:37:d4:8b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:33.859464 env[1495]: 2025-09-13 01:38:33.857 [INFO][3145] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.39-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:33.871000 audit[3175]: NETFILTER_CFG table=filter:78 family=2 entries=46 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:33.871000 audit[3175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23608 a0=3 a1=ffffd04f94d0 a2=0 a3=ffffaaf85fa8 items=0 ppid=2595 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.871000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:33.880101 env[1495]: time="2025-09-13T01:38:33.879994817Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:38:33.880244 env[1495]: time="2025-09-13T01:38:33.880125818Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:38:33.880244 env[1495]: time="2025-09-13T01:38:33.880155818Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:38:33.880477 env[1495]: time="2025-09-13T01:38:33.880434699Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893 pid=3183 runtime=io.containerd.runc.v2 Sep 13 01:38:33.896174 systemd[1]: Started cri-containerd-bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893.scope. Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.914000 audit: BPF prog-id=122 op=LOAD Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3183 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613835656664303932653939666238346133333031666266626330 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3183 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613835656664303932653939666238346133333031666266626330 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit: BPF prog-id=123 op=LOAD Sep 13 01:38:33.915000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3183 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613835656664303932653939666238346133333031666266626330 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit: BPF prog-id=124 op=LOAD Sep 13 01:38:33.915000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3183 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613835656664303932653939666238346133333031666266626330 Sep 13 01:38:33.915000 audit: BPF prog-id=124 op=UNLOAD Sep 13 01:38:33.915000 audit: BPF prog-id=123 op=UNLOAD Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:33.915000 audit: BPF prog-id=125 op=LOAD Sep 13 01:38:33.915000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3183 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:33.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613835656664303932653939666238346133333031666266626330 Sep 13 01:38:33.934446 env[1495]: time="2025-09-13T01:38:33.934392162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6fb78dbb-3c0c-47f7-a51b-fd2c788249cd,Namespace:default,Attempt:0,} returns sandbox id \"bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893\"" Sep 13 01:38:33.936718 env[1495]: time="2025-09-13T01:38:33.936663490Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 01:38:34.547750 kubelet[1924]: E0913 01:38:34.547708 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:35.547906 kubelet[1924]: E0913 01:38:35.547856 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:35.627623 systemd-networkd[1632]: cali60e51b789ff: Gained IPv6LL Sep 13 01:38:36.450695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1667628527.mount: Deactivated successfully. Sep 13 01:38:36.548199 kubelet[1924]: E0913 01:38:36.548142 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:37.548667 kubelet[1924]: E0913 01:38:37.548609 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:38.371187 env[1495]: time="2025-09-13T01:38:38.371132333Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:38.380817 env[1495]: time="2025-09-13T01:38:38.380763842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:38.386177 env[1495]: time="2025-09-13T01:38:38.386134778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:38.391261 env[1495]: time="2025-09-13T01:38:38.391207634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:38.392284 env[1495]: time="2025-09-13T01:38:38.392249997Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 13 01:38:38.395255 env[1495]: time="2025-09-13T01:38:38.395213846Z" level=info msg="CreateContainer within sandbox \"bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 01:38:38.417177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3442958880.mount: Deactivated successfully. Sep 13 01:38:38.434954 env[1495]: time="2025-09-13T01:38:38.434889447Z" level=info msg="CreateContainer within sandbox \"bea85efd092e99fb84a3301fbfbc0a0d32b22139d4a7dd063a8fa10e6c6f8893\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"99c371f518c530c9081592c7f34ad25f82292b9af828cc5c0a6d218e42ed8f66\"" Sep 13 01:38:38.436197 env[1495]: time="2025-09-13T01:38:38.436154890Z" level=info msg="StartContainer for \"99c371f518c530c9081592c7f34ad25f82292b9af828cc5c0a6d218e42ed8f66\"" Sep 13 01:38:38.457834 systemd[1]: Started cri-containerd-99c371f518c530c9081592c7f34ad25f82292b9af828cc5c0a6d218e42ed8f66.scope. Sep 13 01:38:38.498590 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 13 01:38:38.498749 kernel: audit: type=1400 audit(1757727518.475:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.499089 kernel: audit: type=1400 audit(1757727518.475:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.553507 kernel: audit: type=1400 audit(1757727518.475:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.553686 kernel: audit: type=1400 audit(1757727518.475:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.553722 kubelet[1924]: E0913 01:38:38.553613 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.562330 env[1495]: time="2025-09-13T01:38:38.562280754Z" level=info msg="StartContainer for \"99c371f518c530c9081592c7f34ad25f82292b9af828cc5c0a6d218e42ed8f66\" returns successfully" Sep 13 01:38:38.575836 kernel: audit: type=1400 audit(1757727518.475:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.593811 kernel: audit: type=1400 audit(1757727518.475:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.611601 kernel: audit: type=1400 audit(1757727518.475:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.629155 kernel: audit: type=1400 audit(1757727518.475:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.646313 kernel: audit: type=1400 audit(1757727518.475:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.663386 kernel: audit: type=1400 audit(1757727518.481:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.481000 audit: BPF prog-id=126 op=LOAD Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3183 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939633337316635313863353330633930383135393263376633346164 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3183 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939633337316635313863353330633930383135393263376633346164 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.482000 audit: BPF prog-id=127 op=LOAD Sep 13 01:38:38.482000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3183 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939633337316635313863353330633930383135393263376633346164 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit: BPF prog-id=128 op=LOAD Sep 13 01:38:38.498000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3183 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939633337316635313863353330633930383135393263376633346164 Sep 13 01:38:38.498000 audit: BPF prog-id=128 op=UNLOAD Sep 13 01:38:38.498000 audit: BPF prog-id=127 op=UNLOAD Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:38.498000 audit: BPF prog-id=129 op=LOAD Sep 13 01:38:38.498000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3183 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939633337316635313863353330633930383135393263376633346164 Sep 13 01:38:38.657000 audit[3256]: AVC avc: denied { search } for pid=3256 comm="rpcbind" name="crypto" dev="proc" ino=21743 scontext=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:38:38.657000 audit[3256]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9d5cf000 a2=0 a3=0 items=0 ppid=3237 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 key=(null) Sep 13 01:38:38.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 01:38:38.702000 audit[3261]: AVC avc: denied { search } for pid=3261 comm="dbus-daemon" name="crypto" dev="proc" ino=21743 scontext=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:38:38.702000 audit[3261]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbb55f000 a2=0 a3=0 items=0 ppid=3237 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 key=(null) Sep 13 01:38:38.702000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:38:38.705000 audit[3262]: AVC avc: denied { watch } for pid=3262 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537433 scontext=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c735,c887 tclass=dir permissive=0 Sep 13 01:38:38.705000 audit[3262]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf8b35090 a2=2c8 a3=aaaaf8b0fa60 items=0 ppid=3237 pid=3262 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 key=(null) Sep 13 01:38:38.705000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:38:38.710000 audit[3263]: AVC avc: denied { read } for pid=3263 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21777 scontext=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 01:38:38.710000 audit[3263]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa744a570 a2=80000 a3=0 items=0 ppid=3237 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 key=(null) Sep 13 01:38:38.710000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:38:38.711000 audit[3263]: AVC avc: denied { search } for pid=3263 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21743 scontext=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:38:38.711000 audit[3263]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa67df000 a2=0 a3=0 items=0 ppid=3237 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c735,c887 key=(null) Sep 13 01:38:38.711000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:38:38.849000 audit[3268]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:38.849000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe3415ea0 a2=0 a3=1 items=0 ppid=2170 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:38.857000 audit[3268]: NETFILTER_CFG table=nat:80 family=2 entries=110 op=nft_register_chain pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:38.857000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffe3415ea0 a2=0 a3=1 items=0 ppid=2170 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:39.413895 systemd[1]: run-containerd-runc-k8s.io-99c371f518c530c9081592c7f34ad25f82292b9af828cc5c0a6d218e42ed8f66-runc.1kqH9a.mount: Deactivated successfully. Sep 13 01:38:39.554685 kubelet[1924]: E0913 01:38:39.554638 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:40.555591 kubelet[1924]: E0913 01:38:40.555549 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:41.556604 kubelet[1924]: E0913 01:38:41.556563 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:42.557620 kubelet[1924]: E0913 01:38:42.557572 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:43.558151 kubelet[1924]: E0913 01:38:43.558111 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:44.505387 kubelet[1924]: E0913 01:38:44.505345 1924 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:44.529043 env[1495]: time="2025-09-13T01:38:44.529008432Z" level=info msg="StopPodSandbox for \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\"" Sep 13 01:38:44.559089 kubelet[1924]: E0913 01:38:44.559022 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.566 [WARNING][3282] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--w6qfm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4d2a599-64f5-4d60-a88a-7897e3ca7370", ResourceVersion:"1519", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514", Pod:"csi-node-driver-w6qfm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb186a060a1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.567 [INFO][3282] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.567 [INFO][3282] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" iface="eth0" netns="" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.567 [INFO][3282] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.567 [INFO][3282] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.587 [INFO][3290] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.587 [INFO][3290] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.587 [INFO][3290] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.597 [WARNING][3290] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.597 [INFO][3290] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.598 [INFO][3290] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:44.601215 env[1495]: 2025-09-13 01:38:44.599 [INFO][3282] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.601868 env[1495]: time="2025-09-13T01:38:44.601816708Z" level=info msg="TearDown network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\" successfully" Sep 13 01:38:44.601949 env[1495]: time="2025-09-13T01:38:44.601932388Z" level=info msg="StopPodSandbox for \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\" returns successfully" Sep 13 01:38:44.602667 env[1495]: time="2025-09-13T01:38:44.602634350Z" level=info msg="RemovePodSandbox for \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\"" Sep 13 01:38:44.602954 env[1495]: time="2025-09-13T01:38:44.602904351Z" level=info msg="Forcibly stopping sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\"" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.647 [WARNING][3304] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-csi--node--driver--w6qfm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c4d2a599-64f5-4d60-a88a-7897e3ca7370", ResourceVersion:"1519", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"34d350e4ed3addcdd84fb587bd72d62c5871cc61948d7bcda5fc3557901e7514", Pod:"csi-node-driver-w6qfm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb186a060a1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.648 [INFO][3304] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.648 [INFO][3304] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" iface="eth0" netns="" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.648 [INFO][3304] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.648 [INFO][3304] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.684 [INFO][3313] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.684 [INFO][3313] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.684 [INFO][3313] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.697 [WARNING][3313] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.697 [INFO][3313] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" HandleID="k8s-pod-network.b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Workload="10.200.20.39-k8s-csi--node--driver--w6qfm-eth0" Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.698 [INFO][3313] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:44.701711 env[1495]: 2025-09-13 01:38:44.700 [INFO][3304] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9" Sep 13 01:38:44.702363 env[1495]: time="2025-09-13T01:38:44.702327938Z" level=info msg="TearDown network for sandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\" successfully" Sep 13 01:38:44.712111 env[1495]: time="2025-09-13T01:38:44.712037204Z" level=info msg="RemovePodSandbox \"b3f11051702b325950a66596d1048329ac64ec1a6633a082514ffdb35c1db9f9\" returns successfully" Sep 13 01:38:44.712857 env[1495]: time="2025-09-13T01:38:44.712815486Z" level=info msg="StopPodSandbox for \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\"" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.751 [WARNING][3328] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"63253d6c-6331-43ec-aaff-d1312673cf88", ResourceVersion:"1540", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52", Pod:"nginx-deployment-8587fbcb89-vgcbq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califa310f53993", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.751 [INFO][3328] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.751 [INFO][3328] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" iface="eth0" netns="" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.751 [INFO][3328] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.751 [INFO][3328] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.771 [INFO][3336] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.771 [INFO][3336] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.771 [INFO][3336] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.782 [WARNING][3336] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.782 [INFO][3336] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.784 [INFO][3336] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:44.787185 env[1495]: 2025-09-13 01:38:44.785 [INFO][3328] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.787185 env[1495]: time="2025-09-13T01:38:44.787082005Z" level=info msg="TearDown network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\" successfully" Sep 13 01:38:44.787185 env[1495]: time="2025-09-13T01:38:44.787145565Z" level=info msg="StopPodSandbox for \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\" returns successfully" Sep 13 01:38:44.789195 env[1495]: time="2025-09-13T01:38:44.789158251Z" level=info msg="RemovePodSandbox for \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\"" Sep 13 01:38:44.789269 env[1495]: time="2025-09-13T01:38:44.789205051Z" level=info msg="Forcibly stopping sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\"" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.830 [WARNING][3350] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"63253d6c-6331-43ec-aaff-d1312673cf88", ResourceVersion:"1540", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"aba3113c4e31d6f6e41f70835e1ff649298f71a1dd9a31801a94765781c1db52", Pod:"nginx-deployment-8587fbcb89-vgcbq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califa310f53993", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.831 [INFO][3350] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.831 [INFO][3350] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" iface="eth0" netns="" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.831 [INFO][3350] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.831 [INFO][3350] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.850 [INFO][3358] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.851 [INFO][3358] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.851 [INFO][3358] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.861 [WARNING][3358] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.861 [INFO][3358] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" HandleID="k8s-pod-network.be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Workload="10.200.20.39-k8s-nginx--deployment--8587fbcb89--vgcbq-eth0" Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.863 [INFO][3358] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:44.866201 env[1495]: 2025-09-13 01:38:44.864 [INFO][3350] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab" Sep 13 01:38:44.866799 env[1495]: time="2025-09-13T01:38:44.866233298Z" level=info msg="TearDown network for sandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\" successfully" Sep 13 01:38:44.876456 env[1495]: time="2025-09-13T01:38:44.876401365Z" level=info msg="RemovePodSandbox \"be339cbf47887fb3361ee67faabbc37e021c8f3f023e733978387fca17d3a2ab\" returns successfully" Sep 13 01:38:45.559674 kubelet[1924]: E0913 01:38:45.559623 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:46.560700 kubelet[1924]: E0913 01:38:46.560640 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:47.561499 kubelet[1924]: E0913 01:38:47.561452 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:48.561672 kubelet[1924]: E0913 01:38:48.561616 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:49.562512 kubelet[1924]: E0913 01:38:49.562470 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:50.563726 kubelet[1924]: E0913 01:38:50.563685 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:51.565198 kubelet[1924]: E0913 01:38:51.565139 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:52.566259 kubelet[1924]: E0913 01:38:52.566221 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:53.567669 kubelet[1924]: E0913 01:38:53.567623 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:54.568791 kubelet[1924]: E0913 01:38:54.568752 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:55.427247 systemd[1]: run-containerd-runc-k8s.io-fda0da91315f7205bc54c92708d327f6f1aa26728d34a2fcd41f3411f96fafd0-runc.Rx4JbR.mount: Deactivated successfully. Sep 13 01:38:55.570334 kubelet[1924]: E0913 01:38:55.570283 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:56.570951 kubelet[1924]: E0913 01:38:56.570899 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:57.572042 kubelet[1924]: E0913 01:38:57.571993 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:58.573161 kubelet[1924]: E0913 01:38:58.573117 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:59.574017 kubelet[1924]: E0913 01:38:59.573962 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:00.574991 kubelet[1924]: E0913 01:39:00.574947 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:01.575737 kubelet[1924]: E0913 01:39:01.575694 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:02.576929 kubelet[1924]: E0913 01:39:02.576890 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:03.065041 kubelet[1924]: I0913 01:39:03.064941 1924 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=25.607248388 podStartE2EDuration="30.064921222s" podCreationTimestamp="2025-09-13 01:38:33 +0000 UTC" firstStartedPulling="2025-09-13 01:38:33.935914847 +0000 UTC m=+50.470400341" lastFinishedPulling="2025-09-13 01:38:38.393587681 +0000 UTC m=+54.928073175" observedRunningTime="2025-09-13 01:38:38.83049561 +0000 UTC m=+55.364981104" watchObservedRunningTime="2025-09-13 01:39:03.064921222 +0000 UTC m=+79.599406676" Sep 13 01:39:03.070521 systemd[1]: Created slice kubepods-besteffort-pod3e973a0e_f4f8_4b13_b2c4_68e21b80ba07.slice. Sep 13 01:39:03.165905 kubelet[1924]: I0913 01:39:03.165858 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-92a24ad1-286a-4947-b408-e9a856971fd9\" (UniqueName: \"kubernetes.io/nfs/3e973a0e-f4f8-4b13-b2c4-68e21b80ba07-pvc-92a24ad1-286a-4947-b408-e9a856971fd9\") pod \"test-pod-1\" (UID: \"3e973a0e-f4f8-4b13-b2c4-68e21b80ba07\") " pod="default/test-pod-1" Sep 13 01:39:03.166172 kubelet[1924]: I0913 01:39:03.166153 1924 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bnrbq\" (UniqueName: \"kubernetes.io/projected/3e973a0e-f4f8-4b13-b2c4-68e21b80ba07-kube-api-access-bnrbq\") pod \"test-pod-1\" (UID: \"3e973a0e-f4f8-4b13-b2c4-68e21b80ba07\") " pod="default/test-pod-1" Sep 13 01:39:03.512000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.544273 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 01:39:03.544435 kernel: audit: type=1400 audit(1757727543.512:774): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.544477 kernel: Failed to create system directory netfs Sep 13 01:39:03.512000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.571455 kernel: Failed to create system directory netfs Sep 13 01:39:03.571553 kernel: audit: type=1400 audit(1757727543.512:774): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.571604 kernel: Failed to create system directory netfs Sep 13 01:39:03.512000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.596989 kernel: audit: type=1400 audit(1757727543.512:774): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.597125 kernel: Failed to create system directory netfs Sep 13 01:39:03.597297 kubelet[1924]: E0913 01:39:03.597262 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:03.512000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.603408 kernel: audit: type=1400 audit(1757727543.512:774): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.512000 audit[3417]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad4f2d5e0 a1=12c14 a2=aaaaca26e028 a3=aaaad4f1e010 items=0 ppid=551 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:03.653720 kernel: audit: type=1300 audit(1757727543.512:774): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad4f2d5e0 a1=12c14 a2=aaaaca26e028 a3=aaaad4f1e010 items=0 ppid=551 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:03.512000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:39:03.664103 kernel: audit: type=1327 audit(1757727543.512:774): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.703951 kernel: Failed to create system directory fscache Sep 13 01:39:03.704116 kernel: audit: type=1400 audit(1757727543.674:775): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.704152 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.736433 kernel: audit: type=1400 audit(1757727543.674:775): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.736580 kernel: Failed to create system directory fscache Sep 13 01:39:03.736612 kernel: audit: type=1400 audit(1757727543.674:775): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.760902 kernel: Failed to create system directory fscache Sep 13 01:39:03.761013 kernel: audit: type=1400 audit(1757727543.674:775): avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.785783 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.796276 kernel: Failed to create system directory fscache Sep 13 01:39:03.796391 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.801399 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.810646 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.815379 kernel: Failed to create system directory fscache Sep 13 01:39:03.815429 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.824653 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.829611 kernel: Failed to create system directory fscache Sep 13 01:39:03.829691 kernel: Failed to create system directory fscache Sep 13 01:39:03.674000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.838230 kernel: FS-Cache: Loaded Sep 13 01:39:03.674000 audit[3417]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad5140210 a1=4c344 a2=aaaaca26e028 a3=aaaad4f1e010 items=0 ppid=551 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:03.674000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.913260 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.913349 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.913377 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.921834 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.921983 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.930369 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.930498 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.938766 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.938825 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.947445 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.947542 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.956023 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.961034 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.961151 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.969505 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.969591 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.978087 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.978228 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.986667 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.986880 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.995044 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.995141 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.003260 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.003422 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.011610 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.011756 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.019407 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.019511 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.027062 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.027215 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.034589 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.034668 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.042423 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.048030 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.048177 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.056679 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.056765 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.064831 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.064892 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.073271 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.073384 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.077095 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.084873 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.084989 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.092640 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.092772 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.099949 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.100019 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.107654 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.107748 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.115624 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.115739 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.123479 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.123547 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.131126 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.131198 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.138613 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.138681 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.146273 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.146344 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.153955 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.154006 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.161219 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.161279 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.169312 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.169385 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.176735 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.176814 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.184550 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.184645 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.188322 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.195994 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.196066 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.203512 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.203584 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.211150 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.211221 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.218861 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.223142 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.223220 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.230496 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.230555 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.237969 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.238031 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.241681 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.249882 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.249964 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.257822 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.257907 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.265903 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.266013 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.270056 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.280803 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.280897 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.290637 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.290772 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.295882 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.306285 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.306374 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.313970 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.314064 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.317786 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.325258 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.325394 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.332713 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.336945 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.337036 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.344500 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.344593 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.348041 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.351790 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.355589 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.359361 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.366635 kernel: Failed to create system directory sunrpc Sep 13 01:39:04.366682 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:04.504915 kubelet[1924]: E0913 01:39:04.504845 1924 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:04.598657 kubelet[1924]: E0913 01:39:04.598528 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.007946 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.019019 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.032549 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.038752 kernel: Failed to create system directory sunrpc Sep 13 01:39:05.038946 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.047705 kernel: Failed to create system directory sunrpc Sep 13 01:39:05.047816 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.058590 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.063644 kernel: Failed to create system directory sunrpc Sep 13 01:39:05.063797 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.068673 kernel: Failed to create system directory sunrpc Sep 13 01:39:03.898000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.091408 kernel: RPC: Registered named UNIX socket transport module. Sep 13 01:39:05.091578 kernel: RPC: Registered udp transport module. Sep 13 01:39:05.091608 kernel: RPC: Registered tcp transport module. Sep 13 01:39:05.095463 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 01:39:03.898000 audit[3417]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad518c560 a1=14a804 a2=aaaaca26e028 a3=aaaad4f1e010 items=6 ppid=551 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:03.898000 audit: CWD cwd="/" Sep 13 01:39:03.898000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:39:03.898000 audit: PATH item=1 name=(null) inode=22230 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:39:03.898000 audit: PATH item=2 name=(null) inode=22230 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:39:03.898000 audit: PATH item=3 name=(null) inode=22231 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:39:03.898000 audit: PATH item=4 name=(null) inode=22230 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:39:03.898000 audit: PATH item=5 name=(null) inode=22232 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:39:03.898000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.318303 kernel: Failed to create system directory nfs Sep 13 01:39:05.318437 kernel: Failed to create system directory nfs Sep 13 01:39:05.318462 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.326784 kernel: Failed to create system directory nfs Sep 13 01:39:05.326901 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.336224 kernel: Failed to create system directory nfs Sep 13 01:39:05.336335 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.346510 kernel: Failed to create system directory nfs Sep 13 01:39:05.346709 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.356922 kernel: Failed to create system directory nfs Sep 13 01:39:05.357007 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.366811 kernel: Failed to create system directory nfs Sep 13 01:39:05.366902 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.375458 kernel: Failed to create system directory nfs Sep 13 01:39:05.375571 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.379722 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.388894 kernel: Failed to create system directory nfs Sep 13 01:39:05.389057 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.397251 kernel: Failed to create system directory nfs Sep 13 01:39:05.397379 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.405357 kernel: Failed to create system directory nfs Sep 13 01:39:05.405511 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.413339 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.418127 kernel: Failed to create system directory nfs Sep 13 01:39:05.418278 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.426571 kernel: Failed to create system directory nfs Sep 13 01:39:05.426705 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.435166 kernel: Failed to create system directory nfs Sep 13 01:39:05.435591 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.443709 kernel: Failed to create system directory nfs Sep 13 01:39:05.443799 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.452538 kernel: Failed to create system directory nfs Sep 13 01:39:05.452660 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.460735 kernel: Failed to create system directory nfs Sep 13 01:39:05.460875 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.469546 kernel: Failed to create system directory nfs Sep 13 01:39:05.469646 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.478361 kernel: Failed to create system directory nfs Sep 13 01:39:05.478485 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.486640 kernel: Failed to create system directory nfs Sep 13 01:39:05.486732 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.495221 kernel: Failed to create system directory nfs Sep 13 01:39:05.495366 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.503323 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.507638 kernel: Failed to create system directory nfs Sep 13 01:39:05.507741 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.515719 kernel: Failed to create system directory nfs Sep 13 01:39:05.515854 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.524634 kernel: Failed to create system directory nfs Sep 13 01:39:05.524753 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.533260 kernel: Failed to create system directory nfs Sep 13 01:39:05.533353 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.537380 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.545978 kernel: Failed to create system directory nfs Sep 13 01:39:05.546137 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.554384 kernel: Failed to create system directory nfs Sep 13 01:39:05.554505 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.563208 kernel: Failed to create system directory nfs Sep 13 01:39:05.563367 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.567099 kernel: Failed to create system directory nfs Sep 13 01:39:05.304000 audit[3417]: AVC avc: denied { confidentiality } for pid=3417 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.590132 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 01:39:05.304000 audit[3417]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad5335b50 a1=116324 a2=aaaaca26e028 a3=aaaad4f1e010 items=0 ppid=551 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:05.304000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:39:05.599447 kubelet[1924]: E0913 01:39:05.599384 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.746732 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.746819 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.751089 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.759400 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.759512 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.763560 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.767660 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.771889 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.780636 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.780694 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.784661 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.788709 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.792808 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.798552 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.804225 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.808290 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.812442 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.817004 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.821147 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.826609 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.830615 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.834794 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.839266 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.839399 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.847604 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.847778 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.856459 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.856583 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.865750 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.865885 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.873147 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.873233 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.883983 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.893938 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.894098 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.907114 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.907267 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.915373 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.915465 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.919571 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.923917 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.931884 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.931969 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.940831 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.940909 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.944810 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.953176 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.953250 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.961771 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.961844 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.965847 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.970425 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.979243 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.979370 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.988246 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.988328 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.992394 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.996448 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.005323 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.005421 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.013383 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.018294 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.018439 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.022139 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.026183 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.034667 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.034762 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.042420 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.042553 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.050127 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.050251 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.058491 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.058728 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.065367 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.075765 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.075889 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.086173 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.086266 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.095807 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.095926 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.104442 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.104548 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.113948 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.114051 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.122019 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.122149 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.130046 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.134455 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.134514 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.142607 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.142701 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.577940 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.583366 kernel: Failed to create system directory nfs4 Sep 13 01:39:06.583482 kernel: Failed to create system directory nfs4 Sep 13 01:39:05.731000 audit[3423]: AVC avc: denied { confidentiality } for pid=3423 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.600522 kubelet[1924]: E0913 01:39:06.600456 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:06.698039 kernel: NFS: Registering the id_resolver key type Sep 13 01:39:06.698221 kernel: Key type id_resolver registered Sep 13 01:39:06.698260 kernel: Key type id_legacy registered Sep 13 01:39:05.731000 audit[3423]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb5cda010 a1=19c744 a2=aaaab67ae028 a3=aaaae9d7b010 items=0 ppid=551 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:05.731000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.782533 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.782619 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.786543 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.790600 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.794695 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.794830 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.802713 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.802848 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.810710 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.810781 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.814805 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.824090 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.824139 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.833218 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.833322 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.841741 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.841813 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.852179 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.852246 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.860619 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.860721 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.868785 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.868935 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.877024 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.877764 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.771000 audit[3424]: AVC avc: denied { confidentiality } for pid=3424 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:39:06.885445 kernel: Failed to create system directory rpcgss Sep 13 01:39:06.771000 audit[3424]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff85b32010 a1=5eedc a2=aaaadf2ce028 a3=aaaaf881e010 items=0 ppid=551 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:06.771000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 01:39:07.559200 nfsidmap[3431]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-1f3b7ff310' Sep 13 01:39:07.599725 nfsidmap[3432]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-1f3b7ff310' Sep 13 01:39:07.601471 kubelet[1924]: E0913 01:39:07.601372 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:07.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:39:07.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:39:07.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:39:07.613000 audit[1581]: AVC avc: denied { watch_reads } for pid=1581 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:39:07.613000 audit[1581]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf2990fb0 a2=10 a3=0 items=0 ppid=1 pid=1581 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:07.613000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:39:07.614000 audit[1581]: AVC avc: denied { watch_reads } for pid=1581 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:39:07.614000 audit[1581]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf2990fb0 a2=10 a3=0 items=0 ppid=1 pid=1581 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:07.614000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:39:07.614000 audit[1581]: AVC avc: denied { watch_reads } for pid=1581 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:39:07.614000 audit[1581]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf2990fb0 a2=10 a3=0 items=0 ppid=1 pid=1581 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:07.614000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:39:07.874872 env[1495]: time="2025-09-13T01:39:07.874714630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3e973a0e-f4f8-4b13-b2c4-68e21b80ba07,Namespace:default,Attempt:0,}" Sep 13 01:39:08.018375 systemd-networkd[1632]: cali5ec59c6bf6e: Link UP Sep 13 01:39:08.030437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:39:08.030564 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 01:39:08.034314 systemd-networkd[1632]: cali5ec59c6bf6e: Gained carrier Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.946 [INFO][3433] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.39-k8s-test--pod--1-eth0 default 3e973a0e-f4f8-4b13-b2c4-68e21b80ba07 1668 0 2025-09-13 01:38:34 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.39 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.946 [INFO][3433] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.971 [INFO][3446] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" HandleID="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Workload="10.200.20.39-k8s-test--pod--1-eth0" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.971 [INFO][3446] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" HandleID="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Workload="10.200.20.39-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3710), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.39", "pod":"test-pod-1", "timestamp":"2025-09-13 01:39:07.971407244 +0000 UTC"}, Hostname:"10.200.20.39", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.971 [INFO][3446] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.971 [INFO][3446] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.971 [INFO][3446] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.39' Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.982 [INFO][3446] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.986 [INFO][3446] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.990 [INFO][3446] ipam/ipam.go 511: Trying affinity for 192.168.99.0/26 host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.992 [INFO][3446] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.994 [INFO][3446] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.994 [INFO][3446] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:07.996 [INFO][3446] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778 Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:08.001 [INFO][3446] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:08.013 [INFO][3446] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.4/26] block=192.168.99.0/26 handle="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:08.013 [INFO][3446] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.4/26] handle="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" host="10.200.20.39" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:08.013 [INFO][3446] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:08.013 [INFO][3446] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.4/26] IPv6=[] ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" HandleID="k8s-pod-network.7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Workload="10.200.20.39-k8s-test--pod--1-eth0" Sep 13 01:39:08.056032 env[1495]: 2025-09-13 01:39:08.014 [INFO][3433] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3e973a0e-f4f8-4b13-b2c4-68e21b80ba07", ResourceVersion:"1668", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:39:08.056797 env[1495]: 2025-09-13 01:39:08.015 [INFO][3433] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.4/32] ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Sep 13 01:39:08.056797 env[1495]: 2025-09-13 01:39:08.015 [INFO][3433] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Sep 13 01:39:08.056797 env[1495]: 2025-09-13 01:39:08.033 [INFO][3433] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Sep 13 01:39:08.056797 env[1495]: 2025-09-13 01:39:08.034 [INFO][3433] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.39-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3e973a0e-f4f8-4b13-b2c4-68e21b80ba07", ResourceVersion:"1668", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.39", ContainerID:"7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"b2:fd:c9:28:3c:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:39:08.056797 env[1495]: 2025-09-13 01:39:08.048 [INFO][3433] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.39-k8s-test--pod--1-eth0" Sep 13 01:39:08.062000 audit[3460]: NETFILTER_CFG table=filter:81 family=2 entries=36 op=nft_register_chain pid=3460 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:39:08.062000 audit[3460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19132 a0=3 a1=ffffd45fb380 a2=0 a3=ffffa8d34fa8 items=0 ppid=2595 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.062000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:39:08.069979 env[1495]: time="2025-09-13T01:39:08.069904540Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:39:08.070246 env[1495]: time="2025-09-13T01:39:08.070217340Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:39:08.070391 env[1495]: time="2025-09-13T01:39:08.070365900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:39:08.070749 env[1495]: time="2025-09-13T01:39:08.070696941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778 pid=3468 runtime=io.containerd.runc.v2 Sep 13 01:39:08.087038 systemd[1]: Started cri-containerd-7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778.scope. Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.099000 audit: BPF prog-id=130 op=LOAD Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3468 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323032303330316437303736393039383963653635383665363832 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3468 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323032303330316437303736393039383963653635383665363832 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit: BPF prog-id=131 op=LOAD Sep 13 01:39:08.100000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3468 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323032303330316437303736393039383963653635383665363832 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.100000 audit: BPF prog-id=132 op=LOAD Sep 13 01:39:08.100000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3468 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323032303330316437303736393039383963653635383665363832 Sep 13 01:39:08.101000 audit: BPF prog-id=132 op=UNLOAD Sep 13 01:39:08.101000 audit: BPF prog-id=131 op=UNLOAD Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { perfmon } for pid=3478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit[3478]: AVC avc: denied { bpf } for pid=3478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.101000 audit: BPF prog-id=133 op=LOAD Sep 13 01:39:08.101000 audit[3478]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3468 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323032303330316437303736393039383963653635383665363832 Sep 13 01:39:08.124033 env[1495]: time="2025-09-13T01:39:08.123984636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3e973a0e-f4f8-4b13-b2c4-68e21b80ba07,Namespace:default,Attempt:0,} returns sandbox id \"7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778\"" Sep 13 01:39:08.128562 env[1495]: time="2025-09-13T01:39:08.125993639Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:39:08.462953 env[1495]: time="2025-09-13T01:39:08.462900997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:39:08.477053 env[1495]: time="2025-09-13T01:39:08.477009942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:39:08.485856 env[1495]: time="2025-09-13T01:39:08.485819878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:39:08.490020 env[1495]: time="2025-09-13T01:39:08.489980085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:39:08.490737 env[1495]: time="2025-09-13T01:39:08.490708487Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 01:39:08.494061 env[1495]: time="2025-09-13T01:39:08.494015332Z" level=info msg="CreateContainer within sandbox \"7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 01:39:08.536912 env[1495]: time="2025-09-13T01:39:08.536861488Z" level=info msg="CreateContainer within sandbox \"7d2020301d707690989ce6586e68254dc2605887443c8f8d217f2908f6f19778\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d53dc754971e8637b554b7c25ef8b859a04291d8e3a83fd484fb5851a6b792d2\"" Sep 13 01:39:08.537873 env[1495]: time="2025-09-13T01:39:08.537830610Z" level=info msg="StartContainer for \"d53dc754971e8637b554b7c25ef8b859a04291d8e3a83fd484fb5851a6b792d2\"" Sep 13 01:39:08.553297 systemd[1]: Started cri-containerd-d53dc754971e8637b554b7c25ef8b859a04291d8e3a83fd484fb5851a6b792d2.scope. Sep 13 01:39:08.574242 kernel: kauditd_printk_skb: 405 callbacks suppressed Sep 13 01:39:08.574373 kernel: audit: type=1400 audit(1757727548.567:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.607839 kubelet[1924]: E0913 01:39:08.607779 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.630606 kernel: audit: type=1400 audit(1757727548.567:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.630723 kernel: audit: type=1400 audit(1757727548.567:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.648517 kernel: audit: type=1400 audit(1757727548.567:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.666710 kernel: audit: type=1400 audit(1757727548.567:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.687896 kernel: audit: type=1400 audit(1757727548.567:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.706791 kernel: audit: type=1400 audit(1757727548.567:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.714835 env[1495]: time="2025-09-13T01:39:08.714731524Z" level=info msg="StartContainer for \"d53dc754971e8637b554b7c25ef8b859a04291d8e3a83fd484fb5851a6b792d2\" returns successfully" Sep 13 01:39:08.724692 kernel: audit: type=1400 audit(1757727548.567:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.743183 kernel: audit: type=1400 audit(1757727548.567:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.744177 kernel: audit: type=1400 audit(1757727548.567:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.567000 audit: BPF prog-id=134 op=LOAD Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3468 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336463373534393731653836333762353534623763323565663862 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3468 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336463373534393731653836333762353534623763323565663862 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit: BPF prog-id=135 op=LOAD Sep 13 01:39:08.590000 audit[3507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3468 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336463373534393731653836333762353534623763323565663862 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit: BPF prog-id=136 op=LOAD Sep 13 01:39:08.590000 audit[3507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3468 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336463373534393731653836333762353534623763323565663862 Sep 13 01:39:08.590000 audit: BPF prog-id=136 op=UNLOAD Sep 13 01:39:08.590000 audit: BPF prog-id=135 op=UNLOAD Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { perfmon } for pid=3507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit[3507]: AVC avc: denied { bpf } for pid=3507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:39:08.590000 audit: BPF prog-id=137 op=LOAD Sep 13 01:39:08.590000 audit[3507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3468 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:39:08.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336463373534393731653836333762353534623763323565663862 Sep 13 01:39:08.884473 kubelet[1924]: I0913 01:39:08.884407 1924 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.517489294 podStartE2EDuration="34.884383385s" podCreationTimestamp="2025-09-13 01:38:34 +0000 UTC" firstStartedPulling="2025-09-13 01:39:08.125407198 +0000 UTC m=+84.659892692" lastFinishedPulling="2025-09-13 01:39:08.492301289 +0000 UTC m=+85.026786783" observedRunningTime="2025-09-13 01:39:08.884298305 +0000 UTC m=+85.418783759" watchObservedRunningTime="2025-09-13 01:39:08.884383385 +0000 UTC m=+85.418868879" Sep 13 01:39:09.607934 kubelet[1924]: E0913 01:39:09.607896 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:09.931251 systemd-networkd[1632]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 01:39:10.608790 kubelet[1924]: E0913 01:39:10.608737 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:11.609269 kubelet[1924]: E0913 01:39:11.609216 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:12.609627 kubelet[1924]: E0913 01:39:12.609574 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:13.610703 kubelet[1924]: E0913 01:39:13.610661 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:14.612207 kubelet[1924]: E0913 01:39:14.612142 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:39:15.612858 kubelet[1924]: E0913 01:39:15.612822 1924 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"